First published: Fri Oct 25 2019(Updated: )
A heap-based buffer overflow in the vrend_renderer_transfer_write_iov function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via VIRGL_CCMD_RESOURCE_INLINE_WRITE commands. Upstream Issue: <a href="https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/314/diffs?commit_id=8c9cfb4e425542e96f0717189fe4658555baaf08">https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/314/diffs?commit_id=8c9cfb4e425542e96f0717189fe4658555baaf08</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libvirglrenderer | <=0.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1765589 is critical due to the potential for a denial of service caused by a heap-based buffer overflow.
To fix REDHAT-BUG-1765589, it is recommended to upgrade to virglrenderer version 0.8.1 or later.
REDHAT-BUG-1765589 affects virglrenderer versions up to and including 0.8.0.
Yes, REDHAT-BUG-1765589 can potentially be exploited by guest OS users to trigger a denial of service.
The impact of REDHAT-BUG-1765589 is a denial of service, which can disrupt the functionality of applications relying on virglrenderer.