In the Linux kernel, the following vulnerability has been resolved:vhost: fix hung thread due to erroneous iotlb entriesIn vhost_iotlb_add_range_ctx(), range size can overflow to 0 whenstart is 0 and last is ULONG_MAX. One instance where it can happenis when userspace sends an IOTLB message with iova=size=uaddr=0(vhost_process_iotlb_msg). So, an entry with size = 0, start = 0,last = ULONG_MAX ends up in the iotlb. Next time a packet is sent,iotlb_access_ok() loops indefinitely due to that erroneous entry. Call Trace:
No PoCs from references.
- https://github.com/fkie-cad/nvd-json-data-feeds