Stack-based buffer overflow in the parse_identifier function in tgsi_text.c in the TGSI auxiliary module in the Gallium driver in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors related to parsing properties.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2017/02/23/20 | Mailing List Patch |
http://www.securityfocus.com/bid/96437 | Third Party Advisory VDB Entry |
https://bugzilla.redhat.com/show_bug.cgi?id=1426149 | Issue Tracking Patch |
https://cgit.freedesktop.org/virglrenderer/commit/?id=e534b51ca3c3cd25f3990589932a9ed711c59b27 | Patch |
https://lists.freedesktop.org/archives/virglrenderer-devel/2017-February/000145.html | Patch |
https://security.gentoo.org/glsa/201707-06 |
Configurations
History
No history.
Information
Published : 2017-03-15 14:59
Updated : 2024-02-04 19:11
NVD link : CVE-2017-6209
Mitre link : CVE-2017-6209
CVE.ORG link : CVE-2017-6209
JSON object : View
Products Affected
virglrenderer_project
- virglrenderer
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer