A heap-based buffer overflow in the vrend_renderer_transfer_write_iov function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service, or QEMU guest-to-host escape and code execution, via VIRGL_CCMD_RESOURCE_INLINE_WRITE commands.
References
Link | Resource |
---|---|
https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/314/diffs?commit_id=9c280a28651507e6ef87b17b90d47b6af3a4ab7d | Patch Third Party Advisory |
https://gitlab.freedesktop.org/virgl/virglrenderer/commit/cbc8d8b75be360236cada63784046688aeb6d921 | Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1765577 | Issue Tracking Patch Third Party Advisory |
https://access.redhat.com/security/cve/cve-2019-18389 | Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/12/msg00017.html | Mailing List Third Party Advisory |
Information
Published : 2019-12-23 08:15
Updated : 2023-02-02 10:52
NVD link : CVE-2019-18389
Mitre link : CVE-2019-18389
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
redhat
- enterprise_linux
debian
- debian_linux
virglrenderer_project
- virglrenderer
opensuse
- leap