MGASA-2022-0401

Source
https://advisories.mageia.org/MGASA-2022-0401.html
Import Source
https://advisories.mageia.org/MGASA-2022-0401.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2022-0401
Related
Published
2022-11-01T22:58:59Z
Modified
2022-11-01T22:01:24Z
Summary
Updated virglrenderer packages fix security vulnerability
Details

An out-of-bounds write issue was found in the VirGL virtual OpenGL renderer (virglrenderer). This flaw allows a malicious guest to create a specially crafted virgil resource and then issue a VIRTGPU_EXECBUFFER ioctl, leading to a denial of service or possible code execution. (CVE-2022-0135)

A flaw was found in the VirGL virtual OpenGL renderer (virglrenderer). The virgl did not properly initialize memory when allocating a host-backed memory resource. A malicious guest could use this flaw to mmap from the guest kernel and read this uninitialized memory from the host, possibly leading to information disclosure. (CVE-2022-0175)

References
Credits

Affected packages

Mageia:8 / virglrenderer

Package

Name
virglrenderer
Purl
pkg:rpm/mageia/virglrenderer?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.8.2-1.20200212git7d204f39.1.mga8

Ecosystem specific

{
    "section": "core"
}