First published: Mon Jan 10 2022(Updated: )
A flaw was found in the VirGL virtual OpenGL renderer (virglrenderer). The virgl did not properly initialize memory when allocating a host-backed memory resource. A malicious guest could use this flaw to mmap from the guest kernel and read this uninitialized memory from the host, possibly leading to information disclosure.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/virglrenderer | 0.8.2-5+deb11u1 0.10.4-1 1.0.0-1 | |
Freedesktop Virglrenderer | =0.9.0 | |
Freedesktop Virglrenderer | =0.9.1 | |
Red Hat Enterprise Linux | =8.0 |
https://gitlab.freedesktop.org/virgl/virglrenderer/-/commit/b05bb61f454eeb8a85164c8a31510aeb9d79129c
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-0175 is a vulnerability found in the VirGL virtual OpenGL renderer (virglrenderer) that allows a malicious guest to read uninitialized memory from the host.
The severity of CVE-2022-0175 is medium with a CVSS score of 5.5.
CVE-2022-0175 affects Virglrenderer versions 0.9.0 and 0.9.1.
To fix CVE-2022-0175 in Virglrenderer, update to version 0.10.4-1 or higher.
Yes, you can find references for CVE-2022-0175 at the following URLs: [Link 1](https://gitlab.freedesktop.org/virgl/virglrenderer/-/commit/b05bb61f454eeb8a85164c8a31510aeb9d79129c), [Link 2](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2039343), [Link 3](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2039342).