cloud-hypervisor/vm-virtio/src/vhost_user
Samuel Ortiz 664431ff14 vsock: vhost_user: vfio: Fix potential host memory overflow
The vsock packets that we're building are resolving guest addresses to
host ones and use the latter as raw pointers.
If the corresponding guest mapped buffer spans across several regions in
the guest, they will do so in the host as well. Since we have no
guarantees that host regions are contiguous, it may lead the VMM into
trying to access memory outside of its memory space.

For now we fix that by ensuring that the guest buffers do not span
across several regions. If they do, we error out.
Ideally, we should enhance the rust-vmm memory model to support safe
acces across host regions.

Fixes CVE-2019-18960

Signed-off-by: Samuel Ortiz <sameo@linux.intel.com>
2019-12-12 22:15:50 +01:00
..
blk.rs vm-virtio: vhost: Implement the Pausable trait for all vhost-user devices 2019-12-12 08:50:36 +01:00
fs.rs vm-virtio: vhost: Implement the Pausable trait for all vhost-user devices 2019-12-12 08:50:36 +01:00
handler.rs vm-virtio: vhost: Implement the Pausable trait for all vhost-user devices 2019-12-12 08:50:36 +01:00
mod.rs vm-virtio: vhost-user-blk: Add support for reset 2019-09-20 15:56:51 +02:00
net.rs vm-virtio: vhost: Implement the Pausable trait for all vhost-user devices 2019-12-12 08:50:36 +01:00
vu_common_ctrl.rs vsock: vhost_user: vfio: Fix potential host memory overflow 2019-12-12 22:15:50 +01:00