{"id":"OESA-2021-1427","summary":"virglrenderer security update","details":"The virgil3d rendering library is a library used by qemu to implement 3D GPU support for the virtio GPU.\r\n\r\nSecurity Fix(es):\r\n\r\nAn out-of-bounds read in the vrend_blit_need_swizzle function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via VIRGL_CCMD_BLIT commands.(CVE-2019-18390)\r\n\r\nA NULL pointer dereference in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via malformed commands.(CVE-2019-18388)\r\n\r\nA heap-based buffer overflow in the vrend_renderer_transfer_write_iov function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via VIRGL_CCMD_RESOURCE_INLINE_WRITE commands.(CVE-2019-18391)\r\n\r\nA heap-based buffer overflow in the vrend_renderer_transfer_write_iov function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service, or QEMU guest-to-host escape and code execution, via VIRGL_CCMD_RESOURCE_INLINE_WRITE commands.(CVE-2019-18389)","modified":"2026-03-11T06:03:54.519646Z","published":"2021-11-12T11:03:20Z","upstream":["CVE-2019-18388","CVE-2019-18389","CVE-2019-18390","CVE-2019-18391"],"database_specific":{"severity":"High"},"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1427"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-18390"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-18388"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-18391"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-18389"}],"affected":[{"package":{"name":"virglrenderer","ecosystem":"openEuler:20.03-LTS-SP1","purl":"pkg:rpm/openEuler/virglrenderer&distro=openEuler-20.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.7.0-2.oe1"}]}],"ecosystem_specific":{"aarch64":["virglrenderer-debuginfo-0.7.0-2.oe1.aarch64.rpm","virglrenderer-0.7.0-2.oe1.aarch64.rpm","virglrenderer-debugsource-0.7.0-2.oe1.aarch64.rpm","virglrenderer-devel-0.7.0-2.oe1.aarch64.rpm"],"x86_64":["virglrenderer-debuginfo-0.7.0-2.oe1.x86_64.rpm","virglrenderer-0.7.0-2.oe1.x86_64.rpm","virglrenderer-debugsource-0.7.0-2.oe1.x86_64.rpm","virglrenderer-devel-0.7.0-2.oe1.x86_64.rpm"],"src":["virglrenderer-0.7.0-2.oe1.src.rpm"]},"database_specific":{"source":"https://repo.openeuler.org/security/data/osv/OESA-2021-1427.json"}},{"package":{"name":"virglrenderer","ecosystem":"openEuler:20.03-LTS-SP2","purl":"pkg:rpm/openEuler/virglrenderer&distro=openEuler-20.03-LTS-SP2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.7.0-2.oe1"}]}],"ecosystem_specific":{"aarch64":["virglrenderer-debugsource-0.7.0-2.oe1.aarch64.rpm","virglrenderer-0.7.0-2.oe1.aarch64.rpm","virglrenderer-debuginfo-0.7.0-2.oe1.aarch64.rpm","virglrenderer-devel-0.7.0-2.oe1.aarch64.rpm"],"x86_64":["virglrenderer-0.7.0-2.oe1.x86_64.rpm","virglrenderer-devel-0.7.0-2.oe1.x86_64.rpm","virglrenderer-debugsource-0.7.0-2.oe1.x86_64.rpm","virglrenderer-debuginfo-0.7.0-2.oe1.x86_64.rpm"],"src":["virglrenderer-0.7.0-2.oe1.src.rpm"]},"database_specific":{"source":"https://repo.openeuler.org/security/data/osv/OESA-2021-1427.json"}}],"schema_version":"1.7.5"}