First published: Thu Feb 23 2017(Updated: )
Virgil 3d project, used by Quick Emulator(Qemu) to implement 3D GPU support for the virtio GPU, is vulnerable to a null pointer dereference flaw. It could occur when destroying renderer context zero(0) in 'vrend_decode_reset'. A guest user/process could use this flaw to crash the Qemu process instance resulting DoS. Upstream patch: --------------- -> <a href="https://cgit.freedesktop.org/virglrenderer/commit/?id=0a5dff15912207b83018485f83e067474e818bab">https://cgit.freedesktop.org/virglrenderer/commit/?id=0a5dff15912207b83018485f83e067474e818bab</a> Reference: ---------- -> <a href="http://www.openwall.com/lists/oss-security/2017/02/23/21">http://www.openwall.com/lists/oss-security/2017/02/23/21</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libvirglrenderer | ||
QEMU KVM |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1426170 is considered critical due to the potential for a denial-of-service attack.
To fix REDHAT-BUG-1426170, update to the latest version of the Freedesktop Virglrenderer and QEMU packages that include the security patch.
Users of Freedesktop Virglrenderer and QEMU for virtualization are affected by REDHAT-BUG-1426170.
The crash of the QEMU process can lead to a denial-of-service situation for any virtual machines relying on it.
Currently, there are no known effective workarounds for REDHAT-BUG-1426170 other than applying the security update.