Quick Emulator (Qemu) built with the Virtio GPU Device emulator support is vulnerable to an information leakage issue. It could occur while processing 'VIRTIO_GPU_CMD_GET_CAPSET' command. A guest user/process could use this flaw to leak contents of the host memory bytes.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2016/12/08/4 | mailing list third party advisory patch |
https://security.gentoo.org/glsa/201701-49 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/94761 | vdb entry third party advisory |