First published: Wed Feb 15 2017(Updated: )
Virgil 3d project, used by Quick Emulator(Qemu) to implement 3D GPU support for the virtio GPU, is vulnerable to memory leakage issue. It could occur when a guest tries to initialise blitter context via 'VIRGL_CCMD_BLIT' command. A guest user/process could use this flaw to leak host memory resulting in DoS. Upstream patch: --------------- -> <a href="https://cgit.freedesktop.org/virglrenderer/commit/?id=6eb13f7a2dcf391ec9e19b4c2a79e68305f63c22">https://cgit.freedesktop.org/virglrenderer/commit/?id=6eb13f7a2dcf391ec9e19b4c2a79e68305f63c22</a> Reference: ---------- -> <a href="http://www.openwall.com/lists/oss-security/2017/02/15/7">http://www.openwall.com/lists/oss-security/2017/02/15/7</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libvirglrenderer | ||
QEMU Quick Emulator |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1422438 is classified as a vulnerability that can lead to memory leakage.
To fix REDHAT-BUG-1422438, you should patch your installations of virglrenderer and QEMU with the latest updates provided by the vendor.
REHAT-BUG-1422438 is caused by a memory leakage issue when a guest initializes the blitter context using the 'VIRGL_CCMD_BLIT' command.
REDHAT-BUG-1422438 affects users of the Freedesktop virglrenderer and Quick Emulator QEMU that utilize 3D GPU support for virtio GPU.
The potential impacts of REDHAT-BUG-1422438 include the unintentional leaking of host memory, which can lead to data exposure.