Integer overflow in the vrend_create_shader function in vrend_renderer.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (process crash) via crafted pkt_length and offlen values, which trigger an out-of-bounds access.
References
Link | Resource |
---|---|
https://lists.freedesktop.org/archives/virglrenderer-devel/2017-February/000145.html | Patch Vendor Advisory |
https://cgit.freedesktop.org/virglrenderer/commit/?id=93761787b29f37fa627dea9082cdfc1a1ec608d6 | Patch Third Party Advisory Vendor Advisory |
http://www.securityfocus.com/bid/96460 | Third Party Advisory VDB Entry |
http://www.openwall.com/lists/oss-security/2017/02/27/3 | Mailing List Patch Third Party Advisory |
https://security.gentoo.org/glsa/201707-06 |
Configurations
Information
Published : 2017-03-09 18:59
Updated : 2017-07-10 18:33
NVD link : CVE-2017-6355
Mitre link : CVE-2017-6355
JSON object : View
CWE
CWE-190
Integer Overflow or Wraparound
Products Affected
freedesktop
- virglrenderer