{"id":"CVE-2022-0135","details":"An out-of-bounds write issue was found in the VirGL virtual OpenGL renderer (virglrenderer). This flaw allows a malicious guest to create a specially crafted virgil resource and then issue a VIRTGPU_EXECBUFFER ioctl, leading to a denial of service or possible code execution.","modified":"2026-05-18T05:55:41.413341615Z","published":"2022-08-25T00:00:00Z","related":["SUSE-SU-2022:0478-1","SUSE-SU-2022:0479-1","SUSE-SU-2022:2395-1","openSUSE-SU-2022:0479-1","openSUSE-SU-2024:11815-1"],"database_specific":{"unresolved_ranges":[{"source":"AFFECTED_FIELD","extracted_events":[{"last_affected":"virglrenderer 0.8.1 and after"}]}],"cwe_ids":["CWE-787"],"cna_assigner":"redhat","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/0xxx/CVE-2022-0135.json"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/0xxx/CVE-2022-0135.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0135"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202210-05"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2037790"},{"type":"ARTICLE","url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00017.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.freedesktop.org/virgl/virglrenderer","events":[{"introduced":"66c57963aaf09a1c41056bd2a001da1d51957a14"},{"fixed":"f70a6640cac059c29bf3a6f6851ff67d809543ef"}],"database_specific":{"source":"CPE_FIELD","cpe":"cpe:2.3:a:virglrenderer_project:virglrenderer:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0.8.1"},{"fixed":"0.10.0"}]}}],"versions":["virglrenderer-0.9.0","0.9.0","virglrenderer-0.8.2","0.8.2","virglrenderer-0.8.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-0135.json"}}],"schema_version":"1.7.5"}