View previous topic :: View next topic |
Author |
Message |
n05ph3r42 Tux's lil' helper
Joined: 11 Jul 2016 Posts: 135
|
|
Back to top |
|
|
eccerr0r Watchman
Joined: 01 Jul 2004 Posts: 9891 Location: almost Mile High in the USA
|
Posted: Fri Nov 16, 2018 9:23 am Post subject: |
|
|
Thanks for the report.
ugh... may have to switch all to virtio for all my guests on my KVM when I can... or use 8139 for noncritical... _________________ Intel Core i7 2700K/Radeon R7 250/24GB DDR3/256GB SSD
What am I supposed watching? |
|
Back to top |
|
|
n05ph3r42 Tux's lil' helper
Joined: 11 Jul 2016 Posts: 135
|
Posted: Fri Nov 16, 2018 9:35 am Post subject: |
|
|
The bug is already fixed in VBox with latest update. Exploit sample heavily relies on RVA's specific to VBox.
I'm not sure is there exploits in the wild for KVM. It should use different RVA & Write&Read primitives.
E.G. i think you should no worry for your KVM. Skills required to implement exploit for it is high == it have same risk as any other 0day (uncovered).
UPDATED: ive not checked is KVM uses same e1k realization as VBox. |
|
Back to top |
|
|
Ant P. Watchman
Joined: 18 Apr 2009 Posts: 6920
|
Posted: Sat Nov 17, 2018 9:38 am Post subject: |
|
|
This doesn't matter in KVM, it has virtio-net for non-legacy OSes. |
|
Back to top |
|
|
|