openSUSE Security Update : virglrenderer (openSUSE-2017-415)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

This update for virglrenderer fixes the following issues :

Security issues fixed :

- CVE-2017-6386: memory leakage while in
vrend_create_vertex_elements_state (bsc#1027376)

- CVE-2017-6355: integer overflow while creating shader
object (bsc#1027108)

- CVE-2017-6317: fix memory leak in add shader program
(bsc#1026922)

- CVE-2017-6210: NULL pointer dereference in
vrend_decode_reset (bsc#1026725)

- CVE-2017-6209: stack buffer oveflow in parse_identifier
(bsc#1026723)

- CVE-2017-5994: out-of-bounds access in
vrend_create_vertex_elements_state (bsc#1025507)

- CVE-2017-5993: host memory leakage when initialising
blitter context (bsc#1025505)

- CVE-2017-5957: stack overflow in
vrend_decode_set_framebuffer_state (bsc#1024993)

- CVE-2017-5956: OOB access while in vrend_draw_vbo
(bsc#1024992)

- CVE-2017-5937: NULL pointer dereference in vrend_clear
(bsc#1024232)

- CVE-2017-5580: OOB access while parsing texture
instruction (bsc#1021627)

- CVE-2016-10214: host memory leak issue in
virgl_resource_attach_backing (bsc#1024244)

- CVE-2016-10163: host memory leakage when creating decode
context (bsc#1021616)

This update was imported from the SUSE:SLE-12-SP2:Update update
project.

See also :

https://bugzilla.opensuse.org/show_bug.cgi?id=1021616
https://bugzilla.opensuse.org/show_bug.cgi?id=1021627
https://bugzilla.opensuse.org/show_bug.cgi?id=1024232
https://bugzilla.opensuse.org/show_bug.cgi?id=1024244
https://bugzilla.opensuse.org/show_bug.cgi?id=1024992
https://bugzilla.opensuse.org/show_bug.cgi?id=1024993
https://bugzilla.opensuse.org/show_bug.cgi?id=1025505
https://bugzilla.opensuse.org/show_bug.cgi?id=1025507
https://bugzilla.opensuse.org/show_bug.cgi?id=1026723
https://bugzilla.opensuse.org/show_bug.cgi?id=1026725
https://bugzilla.opensuse.org/show_bug.cgi?id=1026922
https://bugzilla.opensuse.org/show_bug.cgi?id=1027108
https://bugzilla.opensuse.org/show_bug.cgi?id=1027376

Solution :

Update the affected virglrenderer packages.

Risk factor :

Medium / CVSS Base Score : 4.9
(CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C)

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now