First published: Thu Feb 23 2017(Updated: )
Virgil 3d project, used by Quick Emulator(Qemu) to implement 3D GPU support for the virtio GPU, is vulnerable to an OOB array access issue. It could occur when parsing properties in parse_identifier(). A guest user/process could use this flaw to crash the Qemu process instance resulting DoS. Upstream patch: --------------- -> <a href="https://cgit.freedesktop.org/virglrenderer/commit/?id=e534b51ca3c3cd25f3990589932a9ed711c59b27">https://cgit.freedesktop.org/virglrenderer/commit/?id=e534b51ca3c3cd25f3990589932a9ed711c59b27</a> Reference: ---------- -> <a href="http://www.openwall.com/lists/oss-security/2017/02/23/20">http://www.openwall.com/lists/oss-security/2017/02/23/20</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libvirglrenderer | ||
QEMU |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1426149 is considered high due to the potential for a denial of service attack.
To fix REDHAT-BUG-1426149, update the affected QEMU and Virglrenderer packages to the latest versions that include the patch for this vulnerability.
REDHAT-BUG-1426149 affects systems that run QEMU utilizing the Virglrenderer project for 3D GPU support.
REDHAT-BUG-1426149 is an out-of-bounds (OOB) array access vulnerability.
Yes, a guest user or process can exploit REDHAT-BUG-1426149 to crash the QEMU process, leading to denial of service.