Quick Emulator (Qemu) built with the Virtio GPU Device emulator support is vulnerable to a memory leakage issue. It could occur while destroying gpu resource object in 'virtio_gpu_resource_destroy'. A guest user/process could use this flaw to leak host memory bytes, resulting in DoS for a host.
The product does not release a resource after its effective lifetime has ended, i.e., after the resource is no longer needed.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2016/12/08/6 | patch mailing list third party advisory |
https://security.gentoo.org/glsa/201701-49 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/94760 | third party advisory vdb entry |