Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 694600 (CVE-2019-14835) - QEMU-KVM Guest to Host Kernel Escape Vulnerability: vhost/vhost_net kernel buffer overflow
Summary: QEMU-KVM Guest to Host Kernel Escape Vulnerability: vhost/vhost_net kernel bu...
Alias: CVE-2019-14835
Product: Gentoo Security
Classification: Unclassified
Component: Kernel (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Kernel Security
Depends on:
Reported: 2019-09-17 08:44 UTC by Agostino Sarubbo
Modified: 2022-01-01 06:47 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2019-09-17 08:44:34 UTC
Severity: Important
Versions affected: 
It looks like this vulnerability was introduced in this commit,
from kernel version 2.6.34 and fixed in latest stable kernel 5.3.

Tencent Blade Team discovered a QEMU-KVM Guest to Host Kernel Escape Vulnerability which is in vhost/vhost_net kernel module.


The vulnerability is in vhost/vhost_net kernel module, vhost/vhost_net is a virtio network backend.

The bug happens in the live migrate flow, when migrating, QEMU needs to know the dirty pages, vhost/vhost_net uses a kernel buffer to record the dirty log, but it doesn't check the bounds of the log buffer.
So we can forge the desc table in guest, wait for migrate or doing something (like increase host machine workload or combine a mem leak bug, depends on vendor’s migrate schedule policy) to trigger cloud vendor to migrate this guest. 
When the guest migrating, it will make the host kernel log buffer overflow.

The vulnerable call path is :  handle_rx(drivers/vhost/net.c) -> get_rx_bufs -> vhost_get_vq_desc -> get_indirect(drivers/vhost/vhost.c)

In VM guest, attack can make a indirect desc table in VM driver to let vhost to enter above call path when live migrates the VM, finally to enter into function get_indirect.

In get_indirect, there is the log buffer overflow bug can be triggered as comments below:
update to latest stable kernel 5.3 or apply the upstream patch.
upstream patch:

About the Poof of concept:
We(Tencent Blade Team) plan to publish simple reproduce steps of this vulnerability about a week later.

The vulnerability was discovered by Peter Pi of Tencent Blade Team
Comment 1 Thomas Deutschmann (RETIRED) gentoo-dev 2019-10-10 22:17:20 UTC
Fix is present in

Comment 2 Matthias Maier gentoo-dev 2020-04-18 19:19:42 UTC
@security: *ping*
Comment 3 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-01-01 06:47:58 UTC
~ $ fix_in_what_release 060423bfdee3f8bc6e2c1bac97de24d5415e2bc4
4.4.193 4.9.193 4.14.144 4.19.73 5.2.15

So, long been fixed in tree.