First published: Tue Feb 28 2017(Updated: )
Virgil 3d project, used by Quick Emulator(Qemu) to implement 3D GPU support for the virtio GPU, is vulnerable to memory leakage issue. It could occur when a guest tries to create vertex elements via 'VIRGL_OBJECT_VERTEX_ELEMENTS' command. A guest user/process could use this flaw to leak host memory resulting in DoS. Upstream patch: --------------- -> <a href="https://cgit.freedesktop.org/virglrenderer/commit/?id=737c3350850ca4dbc5633b3bdb4118176ce59920">https://cgit.freedesktop.org/virglrenderer/commit/?id=737c3350850ca4dbc5633b3bdb4118176ce59920</a> Reference: ---------- -> <a href="http://www.openwall.com/lists/oss-security/2017/03/01/7">http://www.openwall.com/lists/oss-security/2017/03/01/7</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Freedesktop Virgl 3D | ||
QEMU |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1427472 is high due to the potential for memory leakage from the host.
To fix REDHAT-BUG-1427472, update to the latest version of Freedesktop Virgl 3D or QEMU that addresses this vulnerability.
The vulnerability in REDHAT-BUG-1427472 is caused by a memory leakage issue when a guest creates vertex elements using specific commands.
Freedesktop Virgl 3D and QEMU users are affected by REDHAT-BUG-1427472.
Yes, exploitation of REDHAT-BUG-1427472 could expose sensitive data by leaking host memory.