Skip to content

otter-sec/qemu-escape

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 

Repository files navigation

QEMU virtio-snd guest-to-host escape exploit

The exploit works on qemu commit ece408818d27f745ef1b05fb3cc99a1e7a5bf580 on glibc 2.43. Required QEMU devices are virtio-snd and virtio-9p.

-audiodev alsa,id=audio0,in.dev=default,out.dev=default
-device virtio-sound-pci,audiodev=audio0
-fsdev local,id=fsdev0,path="./",security_model=none
-device virtio-9p-pci,fsdev=fsdev0,mount_tag=mnt

During testing kernel version 6.12.0 was used, and exploit.c builds successfully against it.

The kernel should have CONFIG_NET_9P_VIRTIO and CONFIG_SND_VIRTIO disabled, otherwise those drivers will bind before the exploit module can claim the devices. If they are built as modules adding modprobe.blacklist=9pnet_virtio,snd_virtio to the kernel command line should work as well.

The exploit runs the following command on the host if successful: env -u LD_LIBRARY_PATH -u LD_PRELOAD -u LD_AUDIT /bin/sh -c 'gnome-calculator &'

Writeup

https://osec.io/blog/2026-03-17-virtio-snd-qemu-hypervisor-escape

About

QEMU guest-to-host escape exploit

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages