Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CALJHwhRC-+DmnUY-xvOx0uyynp7T2jfarnAcnJbxNqAFesefjw@mail.gmail.com>
Date: Wed, 9 May 2018 15:20:03 +1000
From: Wade Mealing <wmealing@...hat.com>
To: oss-security@...ts.openwall.com
Subject: CVE-2018-1118 linux kernel: vhost: Information disclosure in vhost/vhost.c:vhost_new_msg()

Gday,

A flaw was found in the vhost_new_msg() function which does not
properly initialize memory in messages passed between virtual guests
and the host operating system. This can allow local privileged users
to read previously set kernel memory contents when reading from the
/dev/vhost-net device file.  This would be classified as an
information leak that could be used to defeat other protection
mechanisms.

As far as I can tell this information doesn't flow to guests, only to
the parent system which is hosting the virtual machines.



Upstream post:

https://lkml.org/lkml/2018/4/27/833

https://bugzilla.redhat.com/show_bug.cgi?id=1573699

Thanks
-- 
Wade Mealing

Product Security - Kernel, RHCE

Red Hat

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.