Vigil@nce - Vigil@nce - virgl: memory reading via VIRTIO_GPU_CMD_RESOURCE_ATTACH_BACKING, analyzed on 18/01/2022
February 2022 by Vigil@nce
Vigil@nce - An attacker, in a guest system, can read a memory fragment of virgl, via VIRTIO_GPU_CMD_RESOURCE_ATTACH_BACKING, in order to obtain sensitive information on the host system.
Plus d'information sur : https://vigilance.fr/vulnerability/virgl-memory-reading-via-VIRTIO-GPU-CMD-RESOURCE-ATTACH-BACKING-37279