mirror of
https://github.com/cloud-hypervisor/cloud-hypervisor.git
synced 2024-11-05 11:31:14 +00:00
664431ff14
The vsock packets that we're building are resolving guest addresses to host ones and use the latter as raw pointers. If the corresponding guest mapped buffer spans across several regions in the guest, they will do so in the host as well. Since we have no guarantees that host regions are contiguous, it may lead the VMM into trying to access memory outside of its memory space. For now we fix that by ensuring that the guest buffers do not span across several regions. If they do, we error out. Ideally, we should enhance the rust-vmm memory model to support safe acces across host regions. Fixes CVE-2019-18960 Signed-off-by: Samuel Ortiz <sameo@linux.intel.com>
16 lines
355 B
TOML
16 lines
355 B
TOML
[package]
|
|
name = "vm-device"
|
|
version = "0.1.0"
|
|
authors = ["The Cloud Hypervisor Authors"]
|
|
edition = "2018"
|
|
|
|
[dependencies]
|
|
anyhow = "1.0"
|
|
thiserror = "1.0"
|
|
serde = {version = ">=1.0.27", features = ["rc"] }
|
|
serde_derive = ">=1.0.27"
|
|
serde_json = ">=1.0.9"
|
|
|
|
[dependencies.vm-memory]
|
|
git = "https://github.com/rust-vmm/vm-memory"
|
|
features = ["backend-mmap"] |