Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 866821 (CVE-2022-0135, CVE-2022-0175) - <media-libs/virglrenderer-0.10.1: code execution via malicious guest
Summary: <media-libs/virglrenderer-0.10.1: code execution via malicious guest
Status: RESOLVED FIXED
Alias: CVE-2022-0135, CVE-2022-0175
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal major (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: B1 [glsa+]
Keywords:
Depends on: 876214
Blocks:
  Show dependency tree
 
Reported: 2022-08-26 18:44 UTC by John Helmert III
Modified: 2022-10-16 14:57 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-08-26 18:44:03 UTC
CVE-2022-0135:

An out-of-bounds write issue was found in the VirGL virtual OpenGL renderer (virglrenderer). This flaw allows a malicious guest to create a specially crafted virgil resource and then issue a VIRTGPU_EXECBUFFER ioctl, leading to a denial of service or possible code execution.

Patch: https://gitlab.freedesktop.org/virgl/virglrenderer/-/commit/95e581fd181b213c2ed7cdc63f2abc03eaaa77ec
Comment 1 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-08-27 02:55:44 UTC
CVE-2022-0175:

A flaw was found in the VirGL virtual OpenGL renderer (virglrenderer). The virgl did not properly initialize memory when allocating a host-backed memory resource. A malicious guest could use this flaw to mmap from the guest kernel and read this uninitialized memory from the host, possibly leading to information disclosure.

Unreleased patch: https://gitlab.freedesktop.org/virgl/virglrenderer/-/commit/b05bb61f454eeb8a85164c8a31510aeb9d79129c
RedHat bug: https://bugzilla.redhat.com/show_bug.cgi?id=2039003
Comment 2 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-09-08 05:14:03 UTC
Sorry, both fixes in 0.10.0 and beyond
Comment 3 Larry the Git Cow gentoo-dev 2022-10-09 03:26:22 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=f957cf49020a73e35603b61f76fa2bfc55ab6862

commit f957cf49020a73e35603b61f76fa2bfc55ab6862
Author:     John Helmert III <ajak@gentoo.org>
AuthorDate: 2022-10-09 03:22:41 +0000
Commit:     John Helmert III <ajak@gentoo.org>
CommitDate: 2022-10-09 03:24:43 +0000

    media-libs/virglrenderer: drop 0.8.2
    
    Bug: https://bugs.gentoo.org/866821
    Signed-off-by: John Helmert III <ajak@gentoo.org>

 media-libs/virglrenderer/Manifest                  |  1 -
 .../virglrenderer/virglrenderer-0.8.2.ebuild       | 46 ----------------------
 2 files changed, 47 deletions(-)
Comment 4 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-10-14 03:07:30 UTC
GLSA request filed
Comment 5 Larry the Git Cow gentoo-dev 2022-10-16 14:46:08 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/data/glsa.git/commit/?id=6716ac8ba9951aebe155f31ca4c5eb9e3ed0f660

commit 6716ac8ba9951aebe155f31ca4c5eb9e3ed0f660
Author:     GLSAMaker <glsamaker@gentoo.org>
AuthorDate: 2022-10-16 14:41:23 +0000
Commit:     John Helmert III <ajak@gentoo.org>
CommitDate: 2022-10-16 14:45:23 +0000

    [ GLSA 202210-05 ] virglrenderer: Multiple vulnerabilities
    
    Bug: https://bugs.gentoo.org/866821
    Signed-off-by: GLSAMaker <glsamaker@gentoo.org>
    Signed-off-by: John Helmert III <ajak@gentoo.org>

 glsa-202210-05.xml | 43 +++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 43 insertions(+)
Comment 6 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-10-16 14:57:42 UTC
GLSA released, all done!