Integer overflow in the vrend_create_shader function in vrend_renderer.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (process crash) via crafted pkt_length and offlen values, which trigger an out-of-bounds access.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2017/02/27/3 | Mailing List Patch Third Party Advisory |
http://www.securityfocus.com/bid/96460 | Third Party Advisory VDB Entry |
https://cgit.freedesktop.org/virglrenderer/commit/?id=93761787b29f37fa627dea9082cdfc1a1ec608d6 | Patch Third Party Advisory Vendor Advisory |
https://lists.freedesktop.org/archives/virglrenderer-devel/2017-February/000145.html | Patch Vendor Advisory |
https://security.gentoo.org/glsa/201707-06 | |
http://www.openwall.com/lists/oss-security/2017/02/27/3 | Mailing List Patch Third Party Advisory |
http://www.securityfocus.com/bid/96460 | Third Party Advisory VDB Entry |
https://cgit.freedesktop.org/virglrenderer/commit/?id=93761787b29f37fa627dea9082cdfc1a1ec608d6 | Patch Third Party Advisory Vendor Advisory |
https://lists.freedesktop.org/archives/virglrenderer-devel/2017-February/000145.html | Patch Vendor Advisory |
https://security.gentoo.org/glsa/201707-06 |
Configurations
History
No history.
Information
Published : 2017-03-10 02:59
Updated : 2025-04-20 01:37
NVD link : CVE-2017-6355
Mitre link : CVE-2017-6355
CVE.ORG link : CVE-2017-6355
JSON object : View
Products Affected
freedesktop
- virglrenderer
CWE
CWE-190
Integer Overflow or Wraparound