A heap-based buffer overflow in the vrend_renderer_transfer_write_iov function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service, or QEMU guest-to-host escape and code execution, via VIRGL_CCMD_RESOURCE_INLINE_WRITE commands.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/314/diffs?commit_id=9c280a28651507e6ef87b17b90d47b6af3a4ab7d | third party advisory patch |
https://gitlab.freedesktop.org/virgl/virglrenderer/commit/cbc8d8b75be360236cada63784046688aeb6d921 | third party advisory patch |
https://bugzilla.redhat.com/show_bug.cgi?id=1765577 | issue tracking third party advisory patch |
https://access.redhat.com/security/cve/cve-2019-18389 | third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html | mailing list third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2022/12/msg00017.html | third party advisory mailing list |