Quick Emulator(Qemu) built with the Virtio GPU Device emulator support is vulnerable to a memory leakage issue. It could occur while updating the cursor data in update_cursor_data_virgl. A guest user/process could use this flaw to leak host memory bytes, resulting in DoS for a host. Upstream patch: --------------- -> https://lists.gnu.org/archive/html/qemu-devel/2016-11/msg00029.html Reference: ---------- -> http://www.openwall.com/lists/oss-security/2016/12/05/23
Created qemu tracking bugs for this issue: Affects: fedora-all [bug 1402258]
commit 2d1cd6c7a91a4beb99a0c3a21be529222a708545 Author: Li Qiang <liqiang6-s> Date: Tue Nov 1 04:06:58 2016 -0700 virtio-gpu: fix memory leak in update_cursor_data_virgl