First published: Fri Feb 24 2017(Updated: )
Virgil 3d project, used by Quick Emulator(Qemu) to implement 3D GPU support for the virtio GPU, is vulnerable to a memory leakageissue. It could occur while in add_shader_program(). A guest user/process could use this flaw to leak host memory resulting in DoS. Upstream patch: --------------- -> <a href="https://cgit.freedesktop.org/virglrenderer/commit/?id=a2f12a1b0f95b13b6f8dc3d05d7b74b4386394e4">https://cgit.freedesktop.org/virglrenderer/commit/?id=a2f12a1b0f95b13b6f8dc3d05d7b74b4386394e4</a> Reference: ---------- -> <a href="http://www.openwall.com/lists/oss-security/2017/02/24/5">http://www.openwall.com/lists/oss-security/2017/02/24/5</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libvirglrenderer | ||
QEMU |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-1426756 is categorized as a medium severity vulnerability due to potential denial of service caused by memory leakage.
To fix REDHAT-BUG-1426756, apply the latest patches from the upstream projects virglrenderer and QEMU.
REDHAT-BUG-1426756 affects the Freedesktop virglrenderer and QEMU Quick Emulator software.
REDHAT-BUG-1426756 enables a guest user or process to leak host memory, which can lead to denial of service.
REDHAT-BUG-1426756 was reported in a bug tracking system managed by Red Hat.