2 different AMD specific issue in KVM subsystem with nested
virtualisation - 1 mentioned last week in Episode 130 - would fail to
validate particular operations which could be performed by a guest VM -
in this case would allow a guest to enable the Advanced Virtual Interrupt
Controller for a nested VM (ie L2 VM) - this would then allow the L2 VM
to write to host memory -> code execution on the host
The other - L1 guest could disable interception of both VMLOAD/VMSAVE
calls for a L2 guest - L2 guest could then read/write portions of host
physical memory - code-exec on host
(Episode 124) seq_file vuln - this virt file-system contained an unsigned integer
conversion error - would result in a local user being able to cause an
OOB write and hence possible code-exec in the kernel -> privesc
Trivial bypass of sandbox - exploit was apparently known about since
March and publicly available since end of August but only reported to GS
upstream on 8th August - fix available since 9th, updates for Ubuntu
published on 10th (rare Friday publication)
Arbitrary file reads in apport crash handling - reads certain file when
apps crash, can be tricked to read other files and include these in the
crash report which can then be seen by the user, uploaded to
errors.ubuntu.com etc
Similar to Episode 129 - symlink and file of same name - when unsquash,
write out symlink, then write out file traversing the symlink ->
arbitrary file overwrite
Increasing complexity of web-apps means vulns are now at the edges -
ie. when combining two components, misconfigure one of them -> vuln in
combination due to accidential misuse by the other component