First published: Wed Feb 15 2017(Updated: )
Virgil 3d project, used by Quick Emulator(Qemu) to implement 3D GPU support for the virtio GPU, is vulnerable to an OOB array access issue. It could occur when creating vertex elements array in vrend_create_vertex_elements_state(). A guest user/process could use this flaw to crash the Qemu process instance resulting DoS. Upstream patch: --------------- -> <a href="https://cgit.freedesktop.org/virglrenderer/commit/?id=114688c526fe45f341d75ccd1d85473c3b08f7a7">https://cgit.freedesktop.org/virglrenderer/commit/?id=114688c526fe45f341d75ccd1d85473c3b08f7a7</a> Reference: ---------- -> <a href="http://www.openwall.com/lists/oss-security/2017/02/15/8">http://www.openwall.com/lists/oss-security/2017/02/15/8</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libvirglrenderer | ||
QEMU |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-1422452 is classified as a high severity vulnerability due to the potential for crashing the Qemu process.
To fix REDHAT-BUG-1422452, update to the latest version of Qemu or apply the relevant patches provided by the developers.
The affected software includes the Freedesktop Virglrenderer and Open Source Qemu.
To mitigate REDHAT-BUG-1422452, consider limiting the privileges of guest users and ensuring that your Qemu environment is correctly configured.
REDHAT-BUG-1422452 is an out-of-bounds (OOB) array access vulnerability that can be exploited to crash the Qemu process.