First published: Fri Feb 10 2017(Updated: )
Virgil 3d project, used by Quick Emulator(Qemu) to implement 3D GPU support for the virtio GPU, is vulnerable to an stack buffer overflow issue. It could occur when in vrend_decode_set_framebuffer_state. A guest user/process could use this flaw to crash the Qemu process instance resulting DoS. Upstream patch: --------------- -> <a href="https://cgit.freedesktop.org/virglrenderer/commit/?id=926b9b3460a48f6454d8bbe9e44313d86a65447f">https://cgit.freedesktop.org/virglrenderer/commit/?id=926b9b3460a48f6454d8bbe9e44313d86a65447f</a> Reference: ---------- -> <a href="http://www.openwall.com/lists/oss-security/2017/02/13/3">http://www.openwall.com/lists/oss-security/2017/02/13/3</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libvirglrenderer | ||
QEMU KVM |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-1421126 is classified as a moderate severity vulnerability due to its potential to cause a denial of service.
To fix REDHAT-BUG-1421126, you should update to the latest version of the virglrenderer and QEMU that address the buffer overflow issue.
Systems running the virglrenderer and QEMU are affected by REDHAT-BUG-1421126.
The REDHAT-BUG-1421126 vulnerability can be exploited to crash the QEMU process instance, leading to denial of service.
Any guest user or process can exploit REDHAT-BUG-1421126 to trigger the vulnerability.