First published: Wed Feb 08 2017(Updated: )
Virgil 3d project, used by Quick Emulator(Qemu) to implement 3D GPU support for the virtio GPU, is vulnerable to a null pointer dereference issue. It could occur when a guest invokes a virgl 'VIRGL_CCMD_CLEAR' command. A guest user/process could use this flaw to crash Qemu process resulting in DoS. Upstream patch: --------------- -> <a href="https://cgit.freedesktop.org/virglrenderer/commit/?id=48f67f60967f963b698ec8df57ec6912a43d6282">https://cgit.freedesktop.org/virglrenderer/commit/?id=48f67f60967f963b698ec8df57ec6912a43d6282</a> Reference: ---------- -> <a href="http://www.openwall.com/lists/oss-security/2017/02/08/5">http://www.openwall.com/lists/oss-security/2017/02/08/5</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libvirglrenderer | ||
QEMU KVM |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability REDHAT-BUG-1420246 has a high severity as it can lead to a denial of service (DoS) by crashing the QEMU process.
The REDHAT-BUG-1420246 vulnerability occurs when a guest invokes the virgl 'VIRGL_CCMD_CLEAR' command, leading to a null pointer dereference.
The software affected by REDHAT-BUG-1420246 includes FreeDesktop Virglrenderer and QEMU.
To mitigate the risks of REDHAT-BUG-1420246, it is recommended to update to the patched versions of Virglrenderer and QEMU as provided by the vendors.
As of now, the best practice is to avoid using the specific virgl 'VIRGL_CCMD_CLEAR' command until an official patch is applied for REDHAT-BUG-1420246.