First published: Fri Oct 25 2019(Updated: )
A heap-based buffer overflow in the vrend_renderer_transfer_write_iov function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service, or QEMU guest-to-host escape and code execution, via VIRGL_CCMD_RESOURCE_INLINE_WRITE commands.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Freedesktop Virglrenderer | <=0.8.0 | |
openSUSE | =15.1 | |
Red Hat Enterprise Linux | =8.0 | |
Debian Debian Linux | =10.0 |
https://gitlab.freedesktop.org/virgl/virglrenderer/commit/cbc8d8b75be360236cada63784046688aeb6d921
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-18389 is a vulnerability in the vrend_renderer_transfer_write_iov function in virglrenderer through 0.8.0 that allows guest OS users to cause a denial of service or QEMU guest-to-host escape and code execution.
CVE-2019-18389 can result in a denial of service (DoS) or allow guest OS users to escape the QEMU host and execute arbitrary code.
Versions up to and including 0.8.0 of virglrenderer, openSUSE Leap 15.1, Redhat Enterprise Linux 8.0, and Debian Debian Linux 10.0 are affected.
CVE-2019-18389 has a severity rating of 7.8 (high).
To mitigate CVE-2019-18389, it is recommended to update to a version of virglrenderer beyond 0.8.0, if available, or apply the relevant security patches provided by the software vendors.