Source: qemu
Version: 1:2.7+dfsg-3
Severity: important
Tags: security upstream patch

Hi

Quoting http://www.openwall.com/lists/oss-security/2016/12/06/2

>    Hello,
> 
> Quick Emulator built with the Virtio GPU Device emulator support is vulnerable
> to an information leakage issue. It could occur while processing
> 'VIRTIO_GPU_CMD_GET_CAPSET' command.
> 
> A guest user/process could use this flaw to leak contents of the host memory
> bytes.
> 
> Upstream patch:
> ---------------
>    -> http://lists.gnu.org/archive/html/qemu-devel/2016-11/msg00059.html

A CVE assignment is pending yet.

Regards,
Salvatore

_______________________________________________
Secure-testing-team mailing list
[email protected]
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-team

Reply via email to