CVE-2022-0135

Publication date 1 February 2022

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

7.8 · High

Score breakdown

An out-of-bounds write issue was found in the VirGL virtual OpenGL renderer (virglrenderer). This flaw allows a malicious guest to create a specially crafted virgil resource and then issue a VIRTGPU_EXECBUFFER ioctl, leading to a denial of service or possible code execution.

Status

Package Ubuntu Release Status
virglrenderer 24.10 oracular
Fixed 0.9.1-1~exp1ubuntu2
24.04 LTS noble
Fixed 0.9.1-1~exp1ubuntu2
23.10 mantic
Fixed 0.9.1-1~exp1ubuntu2
23.04 lunar
Fixed 0.9.1-1~exp1ubuntu2
22.10 kinetic
Fixed 0.9.1-1~exp1ubuntu2
22.04 LTS jammy
Fixed 0.9.1-1~exp1ubuntu2
21.10 impish
Fixed 0.8.2-5ubuntu0.21.10.1
20.04 LTS focal
Fixed 0.8.2-1ubuntu1.1
18.04 LTS bionic
Vulnerable
16.04 LTS xenial Ignored end of standard support
14.04 LTS trusty Ignored end of standard support

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
virglrenderer

Severity score breakdown

Parameter Value
Base score 7.8 · High
Attack vector Local
Attack complexity Low
Privileges required Low
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

References

Related Ubuntu Security Notices (USN)

    • USN-5309-1
    • virglrenderer vulnerabilities
    • 28 February 2022

Other references