A flaw was found in the Linux kernel's handle_rx() function in the [vhost_net] driver. A malicious virtual guest, under specific conditions, can trigger an out-of-bounds write in a kmalloc-8 slab on a virtual host which may lead to a kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out. Versions from v4.16 and newer are vulnerable.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://usn.ubuntu.com/3903-2/ | third party advisory vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16880 | issue tracking third party advisory patch |
http://www.securityfocus.com/bid/106735 | vdb entry third party advisory |
https://usn.ubuntu.com/3903-1/ | third party advisory vendor advisory |
https://support.f5.com/csp/article/K03593314 | third party advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html | mailing list third party advisory vendor advisory |