Vigil@nce - Linux kernel: buffer overflow of virtnet_probe
October 2015 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can generate a buffer overflow in the virtnet_probe()
function of the Linux kernel, in order to trigger a denial of
service, and possibly to run code.
– Impacted products: Debian, Linux.
– Severity: 2/4.
– Creation date: 06/08/2015.
DESCRIPTION OF THE VULNERABILITY
A KVM guest system uses the drivers/net/virtio_net.c network
driver of the Linux kernel.
However, the NETIF_F_FRAGLIST option is used, so if the number of
fragments is greater than the size of the storage array, an
overflow occurs.
An attacker can therefore generate a buffer overflow in the
virtnet_probe() function of the Linux kernel, in order to trigger
a denial of service, and possibly to run code.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Linux-kernel-buffer-overflow-of-virtnet-probe-17601