Integer overflow in the vrend_create_shader function in vrend_renderer.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (process crash) via crafted pkt_length and offlen values, which trigger an out-of-bounds access.
                
            References
                    | Link | Resource | 
|---|---|
| https://lists.freedesktop.org/archives/virglrenderer-devel/2017-February/000145.html | Patch Vendor Advisory | 
| https://cgit.freedesktop.org/virglrenderer/commit/?id=93761787b29f37fa627dea9082cdfc1a1ec608d6 | Patch Third Party Advisory Vendor Advisory | 
| http://www.securityfocus.com/bid/96460 | Third Party Advisory VDB Entry | 
| http://www.openwall.com/lists/oss-security/2017/02/27/3 | Mailing List Patch Third Party Advisory | 
| https://security.gentoo.org/glsa/201707-06 | 
Configurations
                    Information
                Published : 2017-03-09 18:59
Updated : 2017-07-10 18:33
NVD link : CVE-2017-6355
Mitre link : CVE-2017-6355
JSON object : View
CWE
                
                    
                        
                        CWE-190
                        
            Integer Overflow or Wraparound
Products Affected
                freedesktop
- virglrenderer
 


