Vulnerability Details : CVE-2022-0175
A flaw was found in the VirGL virtual OpenGL renderer (virglrenderer). The virgl did not properly initialize memory when allocating a host-backed memory resource. A malicious guest could use this flaw to mmap from the guest kernel and read this uninitialized memory from the host, possibly leading to information disclosure.
Vulnerability category: Information leak
Products affected by CVE-2022-0175
- cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*
- cpe:2.3:a:virglrenderer_project:virglrenderer:0.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:virglrenderer_project:virglrenderer:0.9.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-0175
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 14 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-0175
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.8
|
3.6
|
NIST |
CWE ids for CVE-2022-0175
-
The product does not initialize a critical resource.Assigned by:
- nvd@nist.gov (Secondary)
- secalert@redhat.com (Primary)
References for CVE-2022-0175
-
https://gitlab.freedesktop.org/virgl/virglrenderer/-/commit/b05bb61f454eeb8a85164c8a31510aeb9d79129c
vrend: clear memory when allocating a host-backed memory resource (b05bb61f) · Commits · virgl / virglrenderer · GitLabPatch;Third Party Advisory
-
https://security-tracker.debian.org/tracker/CVE-2022-0175
CVE-2022-0175Patch;Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=2039003
2039003 – (CVE-2022-0175) CVE-2022-0175 virglrenderer: memory initialization issue in vrend_resource_alloc_buffer() can lead to info leakIssue Tracking;Patch;Third Party Advisory
-
https://access.redhat.com/security/cve/CVE-2022-0175
CVE-2022-0175- Red Hat Customer PortalThird Party Advisory
-
https://gitlab.freedesktop.org/virgl/virglrenderer/-/merge_requests/654
Fix a number of security issues (!654) · Merge requests · virgl / virglrenderer · GitLabPatch;Third Party Advisory
-
https://security.gentoo.org/glsa/202210-05
virglrenderer: Multiple vulnerabilities (GLSA 202210-05) — Gentoo securityThird Party Advisory
Jump to