Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-18390 (GCVE-0-2019-18390)
Vulnerability from cvelistv5 – Published: 2019-12-23 00:00 – Updated: 2024-08-05 01:54
VLAI?
EPSS
Summary
An out-of-bounds read in the vrend_blit_need_swizzle function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via VIRGL_CCMD_BLIT commands.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T01:54:14.148Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/314/diffs?commit_id=d2cdbcf6a8f2317f250fd54f08aa35dde2fa3e30#3cd772559e0d73afa136d6818023cfd0c4c8ecc0_0_151"
},
{
"tags": [
"x_transferred"
],
"url": "https://gitlab.freedesktop.org/virgl/virglrenderer/commit/24f67de7a9088a873844a39be03cee6882260ac9"
},
{
"name": "Red Hat",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://access.redhat.com/security/cve/cve-2019-18390"
},
{
"tags": [
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765584"
},
{
"name": "openSUSE-SU-2020:0058",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html"
},
{
"name": "[debian-lts-announce] 20221207 [SECURITY] [DLA 3232-1] virglrenderer security update",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00017.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds read in the vrend_blit_need_swizzle function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via VIRGL_CCMD_BLIT commands."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-12-07T00:00:00.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/314/diffs?commit_id=d2cdbcf6a8f2317f250fd54f08aa35dde2fa3e30#3cd772559e0d73afa136d6818023cfd0c4c8ecc0_0_151"
},
{
"url": "https://gitlab.freedesktop.org/virgl/virglrenderer/commit/24f67de7a9088a873844a39be03cee6882260ac9"
},
{
"name": "Red Hat",
"tags": [
"vendor-advisory"
],
"url": "https://access.redhat.com/security/cve/cve-2019-18390"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765584"
},
{
"name": "openSUSE-SU-2020:0058",
"tags": [
"vendor-advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html"
},
{
"name": "[debian-lts-announce] 20221207 [SECURITY] [DLA 3232-1] virglrenderer security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00017.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2019-18390",
"datePublished": "2019-12-23T00:00:00.000Z",
"dateReserved": "2019-10-24T00:00:00.000Z",
"dateUpdated": "2024-08-05T01:54:14.148Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:virglrenderer_project:virglrenderer:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"0.8.0\", \"matchCriteriaId\": \"5E96E0AA-00A9-405F-83B4-292F25E18FBC\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B620311B-34A3-48A6-82DF-6F078D7A4493\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F4CFF558-3C47-480D-A2F0-BABF26042943\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"An out-of-bounds read in the vrend_blit_need_swizzle function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via VIRGL_CCMD_BLIT commands.\"}, {\"lang\": \"es\", \"value\": \"Una lectura fuera de l\\u00edmites en la funci\\u00f3n vrend_blit_need_swizzle en el archivo vrend_renderer.c en virglrenderer versiones hasta 0.8.0, permite a usuarios invitados del sistema operativo causar una denegaci\\u00f3n de servicio por medio de los comandos VIRGL_CCMD_BLIT.\"}]",
"id": "CVE-2019-18390",
"lastModified": "2024-11-21T04:33:11.347",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H\", \"baseScore\": 7.1, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.2}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:P/I:N/A:P\", \"baseScore\": 3.6, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 3.9, \"impactScore\": 4.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2019-12-23T16:15:11.243",
"references": "[{\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/security/cve/cve-2019-18390\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1765584\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://gitlab.freedesktop.org/virgl/virglrenderer/commit/24f67de7a9088a873844a39be03cee6882260ac9\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/314/diffs?commit_id=d2cdbcf6a8f2317f250fd54f08aa35dde2fa3e30#3cd772559e0d73afa136d6818023cfd0c4c8ecc0_0_151\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2022/12/msg00017.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/security/cve/cve-2019-18390\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1765584\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://gitlab.freedesktop.org/virgl/virglrenderer/commit/24f67de7a9088a873844a39be03cee6882260ac9\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/314/diffs?commit_id=d2cdbcf6a8f2317f250fd54f08aa35dde2fa3e30#3cd772559e0d73afa136d6818023cfd0c4c8ecc0_0_151\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2022/12/msg00017.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-125\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2019-18390\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2019-12-23T16:15:11.243\",\"lastModified\":\"2024-11-21T04:33:11.347\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An out-of-bounds read in the vrend_blit_need_swizzle function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via VIRGL_CCMD_BLIT commands.\"},{\"lang\":\"es\",\"value\":\"Una lectura fuera de l\u00edmites en la funci\u00f3n vrend_blit_need_swizzle en el archivo vrend_renderer.c en virglrenderer versiones hasta 0.8.0, permite a usuarios invitados del sistema operativo causar una denegaci\u00f3n de servicio por medio de los comandos VIRGL_CCMD_BLIT.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H\",\"baseScore\":7.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.2}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:N/A:P\",\"baseScore\":3.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:virglrenderer_project:virglrenderer:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"0.8.0\",\"matchCriteriaId\":\"5E96E0AA-00A9-405F-83B4-292F25E18FBC\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B620311B-34A3-48A6-82DF-6F078D7A4493\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/security/cve/cve-2019-18390\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1765584\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://gitlab.freedesktop.org/virgl/virglrenderer/commit/24f67de7a9088a873844a39be03cee6882260ac9\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/314/diffs?commit_id=d2cdbcf6a8f2317f250fd54f08aa35dde2fa3e30#3cd772559e0d73afa136d6818023cfd0c4c8ecc0_0_151\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/12/msg00017.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/security/cve/cve-2019-18390\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1765584\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://gitlab.freedesktop.org/virgl/virglrenderer/commit/24f67de7a9088a873844a39be03cee6882260ac9\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/314/diffs?commit_id=d2cdbcf6a8f2317f250fd54f08aa35dde2fa3e30#3cd772559e0d73afa136d6818023cfd0c4c8ecc0_0_151\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/12/msg00017.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]}]}}"
}
}
SUSE-SU-2020:0017-1
Vulnerability from csaf_suse - Published: 2020-01-07 10:19 - Updated: 2020-01-07 10:19Summary
Security update for virglrenderer
Severity
Important
Notes
Title of the patch: Security update for virglrenderer
Description of the patch: This update for virglrenderer fixes the following issues:
- CVE-2019-18388: Fixed a null pointer dereference which could have led
to denial of service (bsc#1159479).
- CVE-2019-18390: Fixed an out of bound read which could have led to
denial of service (bsc#1159478).
- CVE-2019-18389: Fixed a heap buffer overflow which could have led to
guest escape or denial of service (bsc#1159482).
- CVE-2019-18391: Fixed a heap based buffer overflow which could have led to
guest escape or denial of service (bsc#1159486).
Patchnames: SUSE-2020-17,SUSE-SLE-Module-Development-Tools-OBS-15-2020-17,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-17,SUSE-SLE-Module-Server-Applications-15-2020-17,SUSE-SLE-Module-Server-Applications-15-SP1-2020-17
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for virglrenderer",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for virglrenderer fixes the following issues:\n\n- CVE-2019-18388: Fixed a null pointer dereference which could have led \n to denial of service (bsc#1159479).\n- CVE-2019-18390: Fixed an out of bound read which could have led to \n denial of service (bsc#1159478).\n- CVE-2019-18389: Fixed a heap buffer overflow which could have led to \n guest escape or denial of service (bsc#1159482).\n- CVE-2019-18391: Fixed a heap based buffer overflow which could have led to \n guest escape or denial of service (bsc#1159486). \n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2020-17,SUSE-SLE-Module-Development-Tools-OBS-15-2020-17,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-17,SUSE-SLE-Module-Server-Applications-15-2020-17,SUSE-SLE-Module-Server-Applications-15-SP1-2020-17",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_0017-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2020:0017-1",
"url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200017-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2020:0017-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-January/006300.html"
},
{
"category": "self",
"summary": "SUSE Bug 1159478",
"url": "https://bugzilla.suse.com/1159478"
},
{
"category": "self",
"summary": "SUSE Bug 1159479",
"url": "https://bugzilla.suse.com/1159479"
},
{
"category": "self",
"summary": "SUSE Bug 1159482",
"url": "https://bugzilla.suse.com/1159482"
},
{
"category": "self",
"summary": "SUSE Bug 1159486",
"url": "https://bugzilla.suse.com/1159486"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18388 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18388/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18389 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18390 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18390/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18391 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18391/"
}
],
"title": "Security update for virglrenderer",
"tracking": {
"current_release_date": "2020-01-07T10:19:27Z",
"generator": {
"date": "2020-01-07T10:19:27Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2020:0017-1",
"initial_release_date": "2020-01-07T10:19:27Z",
"revision_history": [
{
"date": "2020-01-07T10:19:27Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libvirglrenderer0-0.6.0-4.3.1.aarch64",
"product": {
"name": "libvirglrenderer0-0.6.0-4.3.1.aarch64",
"product_id": "libvirglrenderer0-0.6.0-4.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "virglrenderer-devel-0.6.0-4.3.1.aarch64",
"product": {
"name": "virglrenderer-devel-0.6.0-4.3.1.aarch64",
"product_id": "virglrenderer-devel-0.6.0-4.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "virglrenderer-test-server-0.6.0-4.3.1.aarch64",
"product": {
"name": "virglrenderer-test-server-0.6.0-4.3.1.aarch64",
"product_id": "virglrenderer-test-server-0.6.0-4.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirglrenderer0-0.6.0-4.3.1.i586",
"product": {
"name": "libvirglrenderer0-0.6.0-4.3.1.i586",
"product_id": "libvirglrenderer0-0.6.0-4.3.1.i586"
}
},
{
"category": "product_version",
"name": "virglrenderer-devel-0.6.0-4.3.1.i586",
"product": {
"name": "virglrenderer-devel-0.6.0-4.3.1.i586",
"product_id": "virglrenderer-devel-0.6.0-4.3.1.i586"
}
},
{
"category": "product_version",
"name": "virglrenderer-test-server-0.6.0-4.3.1.i586",
"product": {
"name": "virglrenderer-test-server-0.6.0-4.3.1.i586",
"product_id": "virglrenderer-test-server-0.6.0-4.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirglrenderer0-0.6.0-4.3.1.ppc64le",
"product": {
"name": "libvirglrenderer0-0.6.0-4.3.1.ppc64le",
"product_id": "libvirglrenderer0-0.6.0-4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "virglrenderer-devel-0.6.0-4.3.1.ppc64le",
"product": {
"name": "virglrenderer-devel-0.6.0-4.3.1.ppc64le",
"product_id": "virglrenderer-devel-0.6.0-4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "virglrenderer-test-server-0.6.0-4.3.1.ppc64le",
"product": {
"name": "virglrenderer-test-server-0.6.0-4.3.1.ppc64le",
"product_id": "virglrenderer-test-server-0.6.0-4.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirglrenderer0-0.6.0-4.3.1.s390x",
"product": {
"name": "libvirglrenderer0-0.6.0-4.3.1.s390x",
"product_id": "libvirglrenderer0-0.6.0-4.3.1.s390x"
}
},
{
"category": "product_version",
"name": "virglrenderer-devel-0.6.0-4.3.1.s390x",
"product": {
"name": "virglrenderer-devel-0.6.0-4.3.1.s390x",
"product_id": "virglrenderer-devel-0.6.0-4.3.1.s390x"
}
},
{
"category": "product_version",
"name": "virglrenderer-test-server-0.6.0-4.3.1.s390x",
"product": {
"name": "virglrenderer-test-server-0.6.0-4.3.1.s390x",
"product_id": "virglrenderer-test-server-0.6.0-4.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirglrenderer0-0.6.0-4.3.1.x86_64",
"product": {
"name": "libvirglrenderer0-0.6.0-4.3.1.x86_64",
"product_id": "libvirglrenderer0-0.6.0-4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "virglrenderer-devel-0.6.0-4.3.1.x86_64",
"product": {
"name": "virglrenderer-devel-0.6.0-4.3.1.x86_64",
"product_id": "virglrenderer-devel-0.6.0-4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "virglrenderer-test-server-0.6.0-4.3.1.x86_64",
"product": {
"name": "virglrenderer-test-server-0.6.0-4.3.1.x86_64",
"product_id": "virglrenderer-test-server-0.6.0-4.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Server Applications 15",
"product": {
"name": "SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-server-applications:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-server-applications:15:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.6.0-4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.aarch64"
},
"product_reference": "libvirglrenderer0-0.6.0-4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.6.0-4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.ppc64le"
},
"product_reference": "libvirglrenderer0-0.6.0-4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.6.0-4.3.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.s390x"
},
"product_reference": "libvirglrenderer0-0.6.0-4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.6.0-4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.x86_64"
},
"product_reference": "libvirglrenderer0-0.6.0-4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virglrenderer-devel-0.6.0-4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.aarch64"
},
"product_reference": "virglrenderer-devel-0.6.0-4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virglrenderer-devel-0.6.0-4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.ppc64le"
},
"product_reference": "virglrenderer-devel-0.6.0-4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virglrenderer-devel-0.6.0-4.3.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.s390x"
},
"product_reference": "virglrenderer-devel-0.6.0-4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virglrenderer-devel-0.6.0-4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.x86_64"
},
"product_reference": "virglrenderer-devel-0.6.0-4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.6.0-4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.aarch64"
},
"product_reference": "libvirglrenderer0-0.6.0-4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.6.0-4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.ppc64le"
},
"product_reference": "libvirglrenderer0-0.6.0-4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.6.0-4.3.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.s390x"
},
"product_reference": "libvirglrenderer0-0.6.0-4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.6.0-4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.x86_64"
},
"product_reference": "libvirglrenderer0-0.6.0-4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virglrenderer-devel-0.6.0-4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.aarch64"
},
"product_reference": "virglrenderer-devel-0.6.0-4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virglrenderer-devel-0.6.0-4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.ppc64le"
},
"product_reference": "virglrenderer-devel-0.6.0-4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virglrenderer-devel-0.6.0-4.3.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.s390x"
},
"product_reference": "virglrenderer-devel-0.6.0-4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virglrenderer-devel-0.6.0-4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.x86_64"
},
"product_reference": "virglrenderer-devel-0.6.0-4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-18388",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18388"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via malformed commands.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18388",
"url": "https://www.suse.com/security/cve/CVE-2019-18388"
},
{
"category": "external",
"summary": "SUSE Bug 1159479 for CVE-2019-18388",
"url": "https://bugzilla.suse.com/1159479"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-07T10:19:27Z",
"details": "moderate"
}
],
"title": "CVE-2019-18388"
},
{
"cve": "CVE-2019-18389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18389"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer overflow in the vrend_renderer_transfer_write_iov function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service, or QEMU guest-to-host escape and code execution, via VIRGL_CCMD_RESOURCE_INLINE_WRITE commands.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18389",
"url": "https://www.suse.com/security/cve/CVE-2019-18389"
},
{
"category": "external",
"summary": "SUSE Bug 1159482 for CVE-2019-18389",
"url": "https://bugzilla.suse.com/1159482"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-07T10:19:27Z",
"details": "important"
}
],
"title": "CVE-2019-18389"
},
{
"cve": "CVE-2019-18390",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18390"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds read in the vrend_blit_need_swizzle function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via VIRGL_CCMD_BLIT commands.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18390",
"url": "https://www.suse.com/security/cve/CVE-2019-18390"
},
{
"category": "external",
"summary": "SUSE Bug 1159478 for CVE-2019-18390",
"url": "https://bugzilla.suse.com/1159478"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-07T10:19:27Z",
"details": "moderate"
}
],
"title": "CVE-2019-18390"
},
{
"cve": "CVE-2019-18391",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18391"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer overflow in the vrend_renderer_transfer_write_iov function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via VIRGL_CCMD_RESOURCE_INLINE_WRITE commands.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18391",
"url": "https://www.suse.com/security/cve/CVE-2019-18391"
},
{
"category": "external",
"summary": "SUSE Bug 1159486 for CVE-2019-18391",
"url": "https://bugzilla.suse.com/1159486"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:libvirglrenderer0-0.6.0-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:virglrenderer-devel-0.6.0-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:libvirglrenderer0-0.6.0-4.3.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:virglrenderer-devel-0.6.0-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-07T10:19:27Z",
"details": "important"
}
],
"title": "CVE-2019-18391"
}
]
}
SUSE-SU-2020:0016-1
Vulnerability from csaf_suse - Published: 2020-01-07 10:18 - Updated: 2020-01-07 10:18Summary
Security update for virglrenderer
Severity
Important
Notes
Title of the patch: Security update for virglrenderer
Description of the patch: This update for virglrenderer fixes the following issues:
- CVE-2019-18388: Fixed a null pointer dereference which could have led
to denial of service (bsc#1159479).
- CVE-2019-18390: Fixed an out of bound read which could have led to
denial of service (bsc#1159478).
- CVE-2019-18389: Fixed a heap buffer overflow which could have led to
guest escape or denial of service (bsc#1159482).
- CVE-2019-18391: Fixed a heap based buffer overflow which could have led to
guest escape or denial of service (bsc#1159486).
Patchnames: HPE-Helion-OpenStack-8-2020-16,SUSE-2020-16,SUSE-OpenStack-Cloud-7-2020-16,SUSE-OpenStack-Cloud-8-2020-16,SUSE-OpenStack-Cloud-Crowbar-8-2020-16,SUSE-SLE-DESKTOP-12-SP4-2020-16,SUSE-SLE-SAP-12-SP2-2020-16,SUSE-SLE-SAP-12-SP3-2020-16,SUSE-SLE-SDK-12-SP4-2020-16,SUSE-SLE-SDK-12-SP5-2020-16,SUSE-SLE-SERVER-12-SP2-2020-16,SUSE-SLE-SERVER-12-SP2-BCL-2020-16,SUSE-SLE-SERVER-12-SP3-2020-16,SUSE-SLE-SERVER-12-SP3-BCL-2020-16,SUSE-SLE-SERVER-12-SP4-2020-16,SUSE-SLE-SERVER-12-SP5-2020-16,SUSE-Storage-5-2020-16
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for virglrenderer",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for virglrenderer fixes the following issues:\n\n- CVE-2019-18388: Fixed a null pointer dereference which could have led\n to denial of service (bsc#1159479).\n- CVE-2019-18390: Fixed an out of bound read which could have led to\n denial of service (bsc#1159478).\n- CVE-2019-18389: Fixed a heap buffer overflow which could have led to\n guest escape or denial of service (bsc#1159482).\n- CVE-2019-18391: Fixed a heap based buffer overflow which could have led to\n guest escape or denial of service (bsc#1159486). \n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "HPE-Helion-OpenStack-8-2020-16,SUSE-2020-16,SUSE-OpenStack-Cloud-7-2020-16,SUSE-OpenStack-Cloud-8-2020-16,SUSE-OpenStack-Cloud-Crowbar-8-2020-16,SUSE-SLE-DESKTOP-12-SP4-2020-16,SUSE-SLE-SAP-12-SP2-2020-16,SUSE-SLE-SAP-12-SP3-2020-16,SUSE-SLE-SDK-12-SP4-2020-16,SUSE-SLE-SDK-12-SP5-2020-16,SUSE-SLE-SERVER-12-SP2-2020-16,SUSE-SLE-SERVER-12-SP2-BCL-2020-16,SUSE-SLE-SERVER-12-SP3-2020-16,SUSE-SLE-SERVER-12-SP3-BCL-2020-16,SUSE-SLE-SERVER-12-SP4-2020-16,SUSE-SLE-SERVER-12-SP5-2020-16,SUSE-Storage-5-2020-16",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_0016-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2020:0016-1",
"url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200016-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2020:0016-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-January/006299.html"
},
{
"category": "self",
"summary": "SUSE Bug 1159478",
"url": "https://bugzilla.suse.com/1159478"
},
{
"category": "self",
"summary": "SUSE Bug 1159479",
"url": "https://bugzilla.suse.com/1159479"
},
{
"category": "self",
"summary": "SUSE Bug 1159482",
"url": "https://bugzilla.suse.com/1159482"
},
{
"category": "self",
"summary": "SUSE Bug 1159486",
"url": "https://bugzilla.suse.com/1159486"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18388 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18388/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18389 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18390 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18390/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18391 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18391/"
}
],
"title": "Security update for virglrenderer",
"tracking": {
"current_release_date": "2020-01-07T10:18:41Z",
"generator": {
"date": "2020-01-07T10:18:41Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2020:0016-1",
"initial_release_date": "2020-01-07T10:18:41Z",
"revision_history": [
{
"date": "2020-01-07T10:18:41Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libvirglrenderer0-0.5.0-12.3.1.aarch64",
"product": {
"name": "libvirglrenderer0-0.5.0-12.3.1.aarch64",
"product_id": "libvirglrenderer0-0.5.0-12.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "virglrenderer-devel-0.5.0-12.3.1.aarch64",
"product": {
"name": "virglrenderer-devel-0.5.0-12.3.1.aarch64",
"product_id": "virglrenderer-devel-0.5.0-12.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "virglrenderer-test-server-0.5.0-12.3.1.aarch64",
"product": {
"name": "virglrenderer-test-server-0.5.0-12.3.1.aarch64",
"product_id": "virglrenderer-test-server-0.5.0-12.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirglrenderer0-0.5.0-12.3.1.i586",
"product": {
"name": "libvirglrenderer0-0.5.0-12.3.1.i586",
"product_id": "libvirglrenderer0-0.5.0-12.3.1.i586"
}
},
{
"category": "product_version",
"name": "virglrenderer-devel-0.5.0-12.3.1.i586",
"product": {
"name": "virglrenderer-devel-0.5.0-12.3.1.i586",
"product_id": "virglrenderer-devel-0.5.0-12.3.1.i586"
}
},
{
"category": "product_version",
"name": "virglrenderer-test-server-0.5.0-12.3.1.i586",
"product": {
"name": "virglrenderer-test-server-0.5.0-12.3.1.i586",
"product_id": "virglrenderer-test-server-0.5.0-12.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"product": {
"name": "libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"product_id": "libvirglrenderer0-0.5.0-12.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "virglrenderer-devel-0.5.0-12.3.1.ppc64le",
"product": {
"name": "virglrenderer-devel-0.5.0-12.3.1.ppc64le",
"product_id": "virglrenderer-devel-0.5.0-12.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "virglrenderer-test-server-0.5.0-12.3.1.ppc64le",
"product": {
"name": "virglrenderer-test-server-0.5.0-12.3.1.ppc64le",
"product_id": "virglrenderer-test-server-0.5.0-12.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirglrenderer0-0.5.0-12.3.1.s390",
"product": {
"name": "libvirglrenderer0-0.5.0-12.3.1.s390",
"product_id": "libvirglrenderer0-0.5.0-12.3.1.s390"
}
},
{
"category": "product_version",
"name": "virglrenderer-devel-0.5.0-12.3.1.s390",
"product": {
"name": "virglrenderer-devel-0.5.0-12.3.1.s390",
"product_id": "virglrenderer-devel-0.5.0-12.3.1.s390"
}
},
{
"category": "product_version",
"name": "virglrenderer-test-server-0.5.0-12.3.1.s390",
"product": {
"name": "virglrenderer-test-server-0.5.0-12.3.1.s390",
"product_id": "virglrenderer-test-server-0.5.0-12.3.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirglrenderer0-0.5.0-12.3.1.s390x",
"product": {
"name": "libvirglrenderer0-0.5.0-12.3.1.s390x",
"product_id": "libvirglrenderer0-0.5.0-12.3.1.s390x"
}
},
{
"category": "product_version",
"name": "virglrenderer-devel-0.5.0-12.3.1.s390x",
"product": {
"name": "virglrenderer-devel-0.5.0-12.3.1.s390x",
"product_id": "virglrenderer-devel-0.5.0-12.3.1.s390x"
}
},
{
"category": "product_version",
"name": "virglrenderer-test-server-0.5.0-12.3.1.s390x",
"product": {
"name": "virglrenderer-test-server-0.5.0-12.3.1.s390x",
"product_id": "virglrenderer-test-server-0.5.0-12.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirglrenderer0-0.5.0-12.3.1.x86_64",
"product": {
"name": "libvirglrenderer0-0.5.0-12.3.1.x86_64",
"product_id": "libvirglrenderer0-0.5.0-12.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "virglrenderer-devel-0.5.0-12.3.1.x86_64",
"product": {
"name": "virglrenderer-devel-0.5.0-12.3.1.x86_64",
"product_id": "virglrenderer-devel-0.5.0-12.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "virglrenderer-test-server-0.5.0-12.3.1.x86_64",
"product": {
"name": "virglrenderer-test-server-0.5.0-12.3.1.x86_64",
"product_id": "virglrenderer-test-server-0.5.0-12.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "HPE Helion OpenStack 8",
"product": {
"name": "HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:hpe-helion-openstack:8"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 7",
"product": {
"name": "SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:7"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 8",
"product": {
"name": "SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:8"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud Crowbar 8",
"product": {
"name": "SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:8"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 5",
"product": {
"name": "SUSE Enterprise Storage 5",
"product_id": "SUSE Enterprise Storage 5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.5.0-12.3.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:libvirglrenderer0-0.5.0-12.3.1.x86_64"
},
"product_reference": "libvirglrenderer0-0.5.0-12.3.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.5.0-12.3.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirglrenderer0-0.5.0-12.3.1.s390x"
},
"product_reference": "libvirglrenderer0-0.5.0-12.3.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.5.0-12.3.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirglrenderer0-0.5.0-12.3.1.x86_64"
},
"product_reference": "libvirglrenderer0-0.5.0-12.3.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.5.0-12.3.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:libvirglrenderer0-0.5.0-12.3.1.x86_64"
},
"product_reference": "libvirglrenderer0-0.5.0-12.3.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.5.0-12.3.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:libvirglrenderer0-0.5.0-12.3.1.x86_64"
},
"product_reference": "libvirglrenderer0-0.5.0-12.3.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.5.0-12.3.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:libvirglrenderer0-0.5.0-12.3.1.x86_64"
},
"product_reference": "libvirglrenderer0-0.5.0-12.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.5.0-12.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirglrenderer0-0.5.0-12.3.1.ppc64le"
},
"product_reference": "libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.5.0-12.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirglrenderer0-0.5.0-12.3.1.x86_64"
},
"product_reference": "libvirglrenderer0-0.5.0-12.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.5.0-12.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirglrenderer0-0.5.0-12.3.1.ppc64le"
},
"product_reference": "libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.5.0-12.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirglrenderer0-0.5.0-12.3.1.x86_64"
},
"product_reference": "libvirglrenderer0-0.5.0-12.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virglrenderer-devel-0.5.0-12.3.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.aarch64"
},
"product_reference": "virglrenderer-devel-0.5.0-12.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virglrenderer-devel-0.5.0-12.3.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.ppc64le"
},
"product_reference": "virglrenderer-devel-0.5.0-12.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virglrenderer-devel-0.5.0-12.3.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.s390x"
},
"product_reference": "virglrenderer-devel-0.5.0-12.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virglrenderer-devel-0.5.0-12.3.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.x86_64"
},
"product_reference": "virglrenderer-devel-0.5.0-12.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virglrenderer-devel-0.5.0-12.3.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.aarch64"
},
"product_reference": "virglrenderer-devel-0.5.0-12.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virglrenderer-devel-0.5.0-12.3.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.ppc64le"
},
"product_reference": "virglrenderer-devel-0.5.0-12.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virglrenderer-devel-0.5.0-12.3.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.s390x"
},
"product_reference": "virglrenderer-devel-0.5.0-12.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virglrenderer-devel-0.5.0-12.3.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.x86_64"
},
"product_reference": "virglrenderer-devel-0.5.0-12.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.5.0-12.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirglrenderer0-0.5.0-12.3.1.ppc64le"
},
"product_reference": "libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.5.0-12.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirglrenderer0-0.5.0-12.3.1.s390x"
},
"product_reference": "libvirglrenderer0-0.5.0-12.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.5.0-12.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirglrenderer0-0.5.0-12.3.1.x86_64"
},
"product_reference": "libvirglrenderer0-0.5.0-12.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.5.0-12.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirglrenderer0-0.5.0-12.3.1.x86_64"
},
"product_reference": "libvirglrenderer0-0.5.0-12.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.5.0-12.3.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.aarch64"
},
"product_reference": "libvirglrenderer0-0.5.0-12.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.5.0-12.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.ppc64le"
},
"product_reference": "libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.5.0-12.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.s390x"
},
"product_reference": "libvirglrenderer0-0.5.0-12.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.5.0-12.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.x86_64"
},
"product_reference": "libvirglrenderer0-0.5.0-12.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.5.0-12.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:libvirglrenderer0-0.5.0-12.3.1.x86_64"
},
"product_reference": "libvirglrenderer0-0.5.0-12.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.5.0-12.3.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.aarch64"
},
"product_reference": "libvirglrenderer0-0.5.0-12.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.5.0-12.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.ppc64le"
},
"product_reference": "libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.5.0-12.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.s390x"
},
"product_reference": "libvirglrenderer0-0.5.0-12.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.5.0-12.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.x86_64"
},
"product_reference": "libvirglrenderer0-0.5.0-12.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.5.0-12.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.aarch64"
},
"product_reference": "libvirglrenderer0-0.5.0-12.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.5.0-12.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.ppc64le"
},
"product_reference": "libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.5.0-12.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.s390x"
},
"product_reference": "libvirglrenderer0-0.5.0-12.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.5.0-12.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.x86_64"
},
"product_reference": "libvirglrenderer0-0.5.0-12.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.5.0-12.3.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.aarch64"
},
"product_reference": "libvirglrenderer0-0.5.0-12.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.5.0-12.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.ppc64le"
},
"product_reference": "libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.5.0-12.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.s390x"
},
"product_reference": "libvirglrenderer0-0.5.0-12.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.5.0-12.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.x86_64"
},
"product_reference": "libvirglrenderer0-0.5.0-12.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.5.0-12.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.aarch64"
},
"product_reference": "libvirglrenderer0-0.5.0-12.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.5.0-12.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.ppc64le"
},
"product_reference": "libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.5.0-12.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.s390x"
},
"product_reference": "libvirglrenderer0-0.5.0-12.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.5.0-12.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.x86_64"
},
"product_reference": "libvirglrenderer0-0.5.0-12.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.5.0-12.3.1.aarch64 as component of SUSE Enterprise Storage 5",
"product_id": "SUSE Enterprise Storage 5:libvirglrenderer0-0.5.0-12.3.1.aarch64"
},
"product_reference": "libvirglrenderer0-0.5.0-12.3.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.5.0-12.3.1.x86_64 as component of SUSE Enterprise Storage 5",
"product_id": "SUSE Enterprise Storage 5:libvirglrenderer0-0.5.0-12.3.1.x86_64"
},
"product_reference": "libvirglrenderer0-0.5.0-12.3.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-18388",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18388"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via malformed commands.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Enterprise Storage 5:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Enterprise Storage 5:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.x86_64",
"SUSE OpenStack Cloud 7:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE OpenStack Cloud 7:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE OpenStack Cloud 8:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libvirglrenderer0-0.5.0-12.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18388",
"url": "https://www.suse.com/security/cve/CVE-2019-18388"
},
{
"category": "external",
"summary": "SUSE Bug 1159479 for CVE-2019-18388",
"url": "https://bugzilla.suse.com/1159479"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Enterprise Storage 5:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Enterprise Storage 5:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.x86_64",
"SUSE OpenStack Cloud 7:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE OpenStack Cloud 7:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE OpenStack Cloud 8:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libvirglrenderer0-0.5.0-12.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Enterprise Storage 5:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Enterprise Storage 5:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.x86_64",
"SUSE OpenStack Cloud 7:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE OpenStack Cloud 7:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE OpenStack Cloud 8:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libvirglrenderer0-0.5.0-12.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-07T10:18:41Z",
"details": "moderate"
}
],
"title": "CVE-2019-18388"
},
{
"cve": "CVE-2019-18389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18389"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer overflow in the vrend_renderer_transfer_write_iov function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service, or QEMU guest-to-host escape and code execution, via VIRGL_CCMD_RESOURCE_INLINE_WRITE commands.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Enterprise Storage 5:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Enterprise Storage 5:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.x86_64",
"SUSE OpenStack Cloud 7:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE OpenStack Cloud 7:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE OpenStack Cloud 8:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libvirglrenderer0-0.5.0-12.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18389",
"url": "https://www.suse.com/security/cve/CVE-2019-18389"
},
{
"category": "external",
"summary": "SUSE Bug 1159482 for CVE-2019-18389",
"url": "https://bugzilla.suse.com/1159482"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Enterprise Storage 5:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Enterprise Storage 5:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.x86_64",
"SUSE OpenStack Cloud 7:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE OpenStack Cloud 7:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE OpenStack Cloud 8:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libvirglrenderer0-0.5.0-12.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Enterprise Storage 5:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Enterprise Storage 5:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.x86_64",
"SUSE OpenStack Cloud 7:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE OpenStack Cloud 7:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE OpenStack Cloud 8:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libvirglrenderer0-0.5.0-12.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-07T10:18:41Z",
"details": "important"
}
],
"title": "CVE-2019-18389"
},
{
"cve": "CVE-2019-18390",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18390"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds read in the vrend_blit_need_swizzle function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via VIRGL_CCMD_BLIT commands.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Enterprise Storage 5:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Enterprise Storage 5:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.x86_64",
"SUSE OpenStack Cloud 7:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE OpenStack Cloud 7:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE OpenStack Cloud 8:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libvirglrenderer0-0.5.0-12.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18390",
"url": "https://www.suse.com/security/cve/CVE-2019-18390"
},
{
"category": "external",
"summary": "SUSE Bug 1159478 for CVE-2019-18390",
"url": "https://bugzilla.suse.com/1159478"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Enterprise Storage 5:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Enterprise Storage 5:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.x86_64",
"SUSE OpenStack Cloud 7:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE OpenStack Cloud 7:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE OpenStack Cloud 8:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libvirglrenderer0-0.5.0-12.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Enterprise Storage 5:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Enterprise Storage 5:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.x86_64",
"SUSE OpenStack Cloud 7:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE OpenStack Cloud 7:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE OpenStack Cloud 8:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libvirglrenderer0-0.5.0-12.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-07T10:18:41Z",
"details": "moderate"
}
],
"title": "CVE-2019-18390"
},
{
"cve": "CVE-2019-18391",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18391"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer overflow in the vrend_renderer_transfer_write_iov function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via VIRGL_CCMD_RESOURCE_INLINE_WRITE commands.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Enterprise Storage 5:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Enterprise Storage 5:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.x86_64",
"SUSE OpenStack Cloud 7:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE OpenStack Cloud 7:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE OpenStack Cloud 8:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libvirglrenderer0-0.5.0-12.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18391",
"url": "https://www.suse.com/security/cve/CVE-2019-18391"
},
{
"category": "external",
"summary": "SUSE Bug 1159486 for CVE-2019-18391",
"url": "https://bugzilla.suse.com/1159486"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Enterprise Storage 5:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Enterprise Storage 5:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.x86_64",
"SUSE OpenStack Cloud 7:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE OpenStack Cloud 7:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE OpenStack Cloud 8:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libvirglrenderer0-0.5.0-12.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Enterprise Storage 5:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Enterprise Storage 5:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:virglrenderer-devel-0.5.0-12.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:virglrenderer-devel-0.5.0-12.3.1.x86_64",
"SUSE OpenStack Cloud 7:libvirglrenderer0-0.5.0-12.3.1.s390x",
"SUSE OpenStack Cloud 7:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE OpenStack Cloud 8:libvirglrenderer0-0.5.0-12.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:libvirglrenderer0-0.5.0-12.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-07T10:18:41Z",
"details": "important"
}
],
"title": "CVE-2019-18391"
}
]
}
GHSA-GP3M-WG52-V97J
Vulnerability from github – Published: 2022-05-24 17:04 – Updated: 2022-12-07 21:30
VLAI?
Details
An out-of-bounds read in the vrend_blit_need_swizzle function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via VIRGL_CCMD_BLIT commands.
Severity ?
7.1 (High)
{
"affected": [],
"aliases": [
"CVE-2019-18390"
],
"database_specific": {
"cwe_ids": [
"CWE-125"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2019-12-23T16:15:00Z",
"severity": "LOW"
},
"details": "An out-of-bounds read in the vrend_blit_need_swizzle function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via VIRGL_CCMD_BLIT commands.",
"id": "GHSA-gp3m-wg52-v97j",
"modified": "2022-12-07T21:30:29Z",
"published": "2022-05-24T17:04:54Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18390"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/cve-2019-18390"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765584"
},
{
"type": "WEB",
"url": "https://gitlab.freedesktop.org/virgl/virglrenderer/commit/24f67de7a9088a873844a39be03cee6882260ac9"
},
{
"type": "WEB",
"url": "https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/314/diffs?commit_id=d2cdbcf6a8f2317f250fd54f08aa35dde2fa3e30#3cd772559e0d73afa136d6818023cfd0c4c8ecc0_0_151"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00017.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"type": "CVSS_V3"
}
]
}
GSD-2019-18390
Vulnerability from gsd - Updated: 2023-12-13 01:23Details
An out-of-bounds read in the vrend_blit_need_swizzle function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via VIRGL_CCMD_BLIT commands.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2019-18390",
"description": "An out-of-bounds read in the vrend_blit_need_swizzle function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via VIRGL_CCMD_BLIT commands.",
"id": "GSD-2019-18390",
"references": [
"https://www.suse.com/security/cve/CVE-2019-18390.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2019-18390"
],
"details": "An out-of-bounds read in the vrend_blit_need_swizzle function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via VIRGL_CCMD_BLIT commands.",
"id": "GSD-2019-18390",
"modified": "2023-12-13T01:23:50.540972Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-18390",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An out-of-bounds read in the vrend_blit_need_swizzle function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via VIRGL_CCMD_BLIT commands."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/314/diffs?commit_id=d2cdbcf6a8f2317f250fd54f08aa35dde2fa3e30#3cd772559e0d73afa136d6818023cfd0c4c8ecc0_0_151",
"refsource": "MISC",
"url": "https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/314/diffs?commit_id=d2cdbcf6a8f2317f250fd54f08aa35dde2fa3e30#3cd772559e0d73afa136d6818023cfd0c4c8ecc0_0_151"
},
{
"name": "https://gitlab.freedesktop.org/virgl/virglrenderer/commit/24f67de7a9088a873844a39be03cee6882260ac9",
"refsource": "MISC",
"url": "https://gitlab.freedesktop.org/virgl/virglrenderer/commit/24f67de7a9088a873844a39be03cee6882260ac9"
},
{
"name": "Red Hat",
"refsource": "REDHAT",
"url": "https://access.redhat.com/security/cve/cve-2019-18390"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1765584",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765584"
},
{
"name": "openSUSE-SU-2020:0058",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html"
},
{
"name": "[debian-lts-announce] 20221207 [SECURITY] [DLA 3232-1] virglrenderer security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00017.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:virglrenderer_project:virglrenderer:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "0.8.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-18390"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "An out-of-bounds read in the vrend_blit_need_swizzle function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via VIRGL_CCMD_BLIT commands."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "Red Hat",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/cve-2019-18390"
},
{
"name": "https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/314/diffs?commit_id=d2cdbcf6a8f2317f250fd54f08aa35dde2fa3e30#3cd772559e0d73afa136d6818023cfd0c4c8ecc0_0_151",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/314/diffs?commit_id=d2cdbcf6a8f2317f250fd54f08aa35dde2fa3e30#3cd772559e0d73afa136d6818023cfd0c4c8ecc0_0_151"
},
{
"name": "https://gitlab.freedesktop.org/virgl/virglrenderer/commit/24f67de7a9088a873844a39be03cee6882260ac9",
"refsource": "MISC",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://gitlab.freedesktop.org/virgl/virglrenderer/commit/24f67de7a9088a873844a39be03cee6882260ac9"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1765584",
"refsource": "MISC",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765584"
},
{
"name": "openSUSE-SU-2020:0058",
"refsource": "SUSE",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html"
},
{
"name": "[debian-lts-announce] 20221207 [SECURITY] [DLA 3232-1] virglrenderer security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00017.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
},
"lastModifiedDate": "2023-02-03T18:42Z",
"publishedDate": "2019-12-23T16:15Z"
}
}
}
CNVD-2019-47193
Vulnerability from cnvd - Published: 2019-12-27
VLAI Severity ?
Title
virglrenderer 'vrend_blit_need_swizzle'函数缓冲区溢出漏洞
Description
virglrenderer是一款VirGL虚拟OpenGL渲染器。
virglrenderer 0.8.0及之前版本中的vrend_renderer.c文件的'vrend_blit_need_swizzle'函数存在缓冲区溢出漏洞。该漏洞源于网络系统或产品在内存上执行操作时,未正确验证数据边界,导致向关联的其他内存位置上执行了错误的读写操作。攻击者可利用该漏洞导致缓冲区溢出或堆溢出等。
Severity
低
Patch Name
virglrenderer 'vrend_blit_need_swizzle'函数缓冲区溢出漏洞的补丁
Patch Description
virglrenderer是一款VirGL虚拟OpenGL渲染器。
virglrenderer 0.8.0及之前版本中的vrend_renderer.c文件的'vrend_blit_need_swizzle'函数存在缓冲区溢出漏洞。该漏洞源于网络系统或产品在内存上执行操作时,未正确验证数据边界,导致向关联的其他内存位置上执行了错误的读写操作。攻击者可利用该漏洞导致缓冲区溢出或堆溢出等。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
https://gitlab.freedesktop.org/virgl/virglrenderer/commit/24f67de7a9088a873844a39be03cee6882260ac9
Reference
https://access.redhat.com/security/cve/cve-2019-18390
https://bugzilla.redhat.com/show_bug.cgi?id=1765584
{
"cves": {
"cve": {
"cveNumber": "CVE-2019-18390"
}
},
"description": "virglrenderer\u662f\u4e00\u6b3eVirGL\u865a\u62dfOpenGL\u6e32\u67d3\u5668\u3002\n\nvirglrenderer 0.8.0\u53ca\u4e4b\u524d\u7248\u672c\u4e2d\u7684vrend_renderer.c\u6587\u4ef6\u7684\u0027vrend_blit_need_swizzle\u0027\u51fd\u6570\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7f51\u7edc\u7cfb\u7edf\u6216\u4ea7\u54c1\u5728\u5185\u5b58\u4e0a\u6267\u884c\u64cd\u4f5c\u65f6\uff0c\u672a\u6b63\u786e\u9a8c\u8bc1\u6570\u636e\u8fb9\u754c\uff0c\u5bfc\u81f4\u5411\u5173\u8054\u7684\u5176\u4ed6\u5185\u5b58\u4f4d\u7f6e\u4e0a\u6267\u884c\u4e86\u9519\u8bef\u7684\u8bfb\u5199\u64cd\u4f5c\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u7f13\u51b2\u533a\u6ea2\u51fa\u6216\u5806\u6ea2\u51fa\u7b49\u3002",
"formalWay": "https://gitlab.freedesktop.org/virgl/virglrenderer/commit/24f67de7a9088a873844a39be03cee6882260ac9",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2019-47193",
"openTime": "2019-12-27",
"patchDescription": "virglrenderer\u662f\u4e00\u6b3eVirGL\u865a\u62dfOpenGL\u6e32\u67d3\u5668\u3002\r\n\r\nvirglrenderer 0.8.0\u53ca\u4e4b\u524d\u7248\u672c\u4e2d\u7684vrend_renderer.c\u6587\u4ef6\u7684\u0027vrend_blit_need_swizzle\u0027\u51fd\u6570\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7f51\u7edc\u7cfb\u7edf\u6216\u4ea7\u54c1\u5728\u5185\u5b58\u4e0a\u6267\u884c\u64cd\u4f5c\u65f6\uff0c\u672a\u6b63\u786e\u9a8c\u8bc1\u6570\u636e\u8fb9\u754c\uff0c\u5bfc\u81f4\u5411\u5173\u8054\u7684\u5176\u4ed6\u5185\u5b58\u4f4d\u7f6e\u4e0a\u6267\u884c\u4e86\u9519\u8bef\u7684\u8bfb\u5199\u64cd\u4f5c\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u7f13\u51b2\u533a\u6ea2\u51fa\u6216\u5806\u6ea2\u51fa\u7b49\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "virglrenderer \u0027vrend_blit_need_swizzle\u0027\u51fd\u6570\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u7684\u8865\u4e01",
"referenceLink": "https://access.redhat.com/security/cve/cve-2019-18390\r\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1765584",
"serverity": "\u4f4e",
"submitTime": "2019-12-24",
"title": "virglrenderer \u0027vrend_blit_need_swizzle\u0027\u51fd\u6570\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e"
}
FKIE_CVE-2019-18390
Vulnerability from fkie_nvd - Published: 2019-12-23 16:15 - Updated: 2024-11-21 04:33
Severity ?
Summary
An out-of-bounds read in the vrend_blit_need_swizzle function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via VIRGL_CCMD_BLIT commands.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html | Third Party Advisory | |
| cve@mitre.org | https://access.redhat.com/security/cve/cve-2019-18390 | Third Party Advisory | |
| cve@mitre.org | https://bugzilla.redhat.com/show_bug.cgi?id=1765584 | Issue Tracking, Patch, Third Party Advisory | |
| cve@mitre.org | https://gitlab.freedesktop.org/virgl/virglrenderer/commit/24f67de7a9088a873844a39be03cee6882260ac9 | Patch, Third Party Advisory | |
| cve@mitre.org | https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/314/diffs?commit_id=d2cdbcf6a8f2317f250fd54f08aa35dde2fa3e30#3cd772559e0d73afa136d6818023cfd0c4c8ecc0_0_151 | Third Party Advisory | |
| cve@mitre.org | https://lists.debian.org/debian-lts-announce/2022/12/msg00017.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/security/cve/cve-2019-18390 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1765584 | Issue Tracking, Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://gitlab.freedesktop.org/virgl/virglrenderer/commit/24f67de7a9088a873844a39be03cee6882260ac9 | Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/314/diffs?commit_id=d2cdbcf6a8f2317f250fd54f08aa35dde2fa3e30#3cd772559e0d73afa136d6818023cfd0c4c8ecc0_0_151 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2022/12/msg00017.html | Mailing List, Third Party Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| virglrenderer_project | virglrenderer | * | |
| opensuse | leap | 15.1 | |
| redhat | enterprise_linux | 8.0 | |
| debian | debian_linux | 10.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:virglrenderer_project:virglrenderer:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5E96E0AA-00A9-405F-83B4-292F25E18FBC",
"versionEndIncluding": "0.8.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds read in the vrend_blit_need_swizzle function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via VIRGL_CCMD_BLIT commands."
},
{
"lang": "es",
"value": "Una lectura fuera de l\u00edmites en la funci\u00f3n vrend_blit_need_swizzle en el archivo vrend_renderer.c en virglrenderer versiones hasta 0.8.0, permite a usuarios invitados del sistema operativo causar una denegaci\u00f3n de servicio por medio de los comandos VIRGL_CCMD_BLIT."
}
],
"id": "CVE-2019-18390",
"lastModified": "2024-11-21T04:33:11.347",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-12-23T16:15:11.243",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/cve-2019-18390"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765584"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://gitlab.freedesktop.org/virgl/virglrenderer/commit/24f67de7a9088a873844a39be03cee6882260ac9"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/314/diffs?commit_id=d2cdbcf6a8f2317f250fd54f08aa35dde2fa3e30#3cd772559e0d73afa136d6818023cfd0c4c8ecc0_0_151"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00017.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/cve-2019-18390"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765584"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://gitlab.freedesktop.org/virgl/virglrenderer/commit/24f67de7a9088a873844a39be03cee6882260ac9"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/314/diffs?commit_id=d2cdbcf6a8f2317f250fd54f08aa35dde2fa3e30#3cd772559e0d73afa136d6818023cfd0c4c8ecc0_0_151"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00017.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
OPENSUSE-SU-2024:11499-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Summary
libvirglrenderer1-0.9.1-1.3 on GA media
Severity
Moderate
Notes
Title of the patch: libvirglrenderer1-0.9.1-1.3 on GA media
Description of the patch: These are all security issues fixed in the libvirglrenderer1-0.9.1-1.3 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2024-11499
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libvirglrenderer1-0.9.1-1.3 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libvirglrenderer1-0.9.1-1.3 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11499",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11499-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-10214 page",
"url": "https://www.suse.com/security/cve/CVE-2016-10214/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5937 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5937/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5957 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5957/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5993 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5993/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5994 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5994/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-6386 page",
"url": "https://www.suse.com/security/cve/CVE-2017-6386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18388 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18388/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18389 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18390 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18390/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18391 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18391/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18392 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18392/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8002 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8002/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8003 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8003/"
}
],
"title": "libvirglrenderer1-0.9.1-1.3 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11499-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libvirglrenderer1-0.9.1-1.3.aarch64",
"product": {
"name": "libvirglrenderer1-0.9.1-1.3.aarch64",
"product_id": "libvirglrenderer1-0.9.1-1.3.aarch64"
}
},
{
"category": "product_version",
"name": "virglrenderer-devel-0.9.1-1.3.aarch64",
"product": {
"name": "virglrenderer-devel-0.9.1-1.3.aarch64",
"product_id": "virglrenderer-devel-0.9.1-1.3.aarch64"
}
},
{
"category": "product_version",
"name": "virglrenderer-test-server-0.9.1-1.3.aarch64",
"product": {
"name": "virglrenderer-test-server-0.9.1-1.3.aarch64",
"product_id": "virglrenderer-test-server-0.9.1-1.3.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirglrenderer1-0.9.1-1.3.ppc64le",
"product": {
"name": "libvirglrenderer1-0.9.1-1.3.ppc64le",
"product_id": "libvirglrenderer1-0.9.1-1.3.ppc64le"
}
},
{
"category": "product_version",
"name": "virglrenderer-devel-0.9.1-1.3.ppc64le",
"product": {
"name": "virglrenderer-devel-0.9.1-1.3.ppc64le",
"product_id": "virglrenderer-devel-0.9.1-1.3.ppc64le"
}
},
{
"category": "product_version",
"name": "virglrenderer-test-server-0.9.1-1.3.ppc64le",
"product": {
"name": "virglrenderer-test-server-0.9.1-1.3.ppc64le",
"product_id": "virglrenderer-test-server-0.9.1-1.3.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirglrenderer1-0.9.1-1.3.s390x",
"product": {
"name": "libvirglrenderer1-0.9.1-1.3.s390x",
"product_id": "libvirglrenderer1-0.9.1-1.3.s390x"
}
},
{
"category": "product_version",
"name": "virglrenderer-devel-0.9.1-1.3.s390x",
"product": {
"name": "virglrenderer-devel-0.9.1-1.3.s390x",
"product_id": "virglrenderer-devel-0.9.1-1.3.s390x"
}
},
{
"category": "product_version",
"name": "virglrenderer-test-server-0.9.1-1.3.s390x",
"product": {
"name": "virglrenderer-test-server-0.9.1-1.3.s390x",
"product_id": "virglrenderer-test-server-0.9.1-1.3.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirglrenderer1-0.9.1-1.3.x86_64",
"product": {
"name": "libvirglrenderer1-0.9.1-1.3.x86_64",
"product_id": "libvirglrenderer1-0.9.1-1.3.x86_64"
}
},
{
"category": "product_version",
"name": "virglrenderer-devel-0.9.1-1.3.x86_64",
"product": {
"name": "virglrenderer-devel-0.9.1-1.3.x86_64",
"product_id": "virglrenderer-devel-0.9.1-1.3.x86_64"
}
},
{
"category": "product_version",
"name": "virglrenderer-test-server-0.9.1-1.3.x86_64",
"product": {
"name": "virglrenderer-test-server-0.9.1-1.3.x86_64",
"product_id": "virglrenderer-test-server-0.9.1-1.3.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer1-0.9.1-1.3.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.aarch64"
},
"product_reference": "libvirglrenderer1-0.9.1-1.3.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer1-0.9.1-1.3.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.ppc64le"
},
"product_reference": "libvirglrenderer1-0.9.1-1.3.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer1-0.9.1-1.3.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.s390x"
},
"product_reference": "libvirglrenderer1-0.9.1-1.3.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer1-0.9.1-1.3.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.x86_64"
},
"product_reference": "libvirglrenderer1-0.9.1-1.3.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virglrenderer-devel-0.9.1-1.3.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.aarch64"
},
"product_reference": "virglrenderer-devel-0.9.1-1.3.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virglrenderer-devel-0.9.1-1.3.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.ppc64le"
},
"product_reference": "virglrenderer-devel-0.9.1-1.3.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virglrenderer-devel-0.9.1-1.3.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.s390x"
},
"product_reference": "virglrenderer-devel-0.9.1-1.3.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virglrenderer-devel-0.9.1-1.3.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.x86_64"
},
"product_reference": "virglrenderer-devel-0.9.1-1.3.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virglrenderer-test-server-0.9.1-1.3.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.aarch64"
},
"product_reference": "virglrenderer-test-server-0.9.1-1.3.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virglrenderer-test-server-0.9.1-1.3.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.ppc64le"
},
"product_reference": "virglrenderer-test-server-0.9.1-1.3.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virglrenderer-test-server-0.9.1-1.3.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.s390x"
},
"product_reference": "virglrenderer-test-server-0.9.1-1.3.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virglrenderer-test-server-0.9.1-1.3.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.x86_64"
},
"product_reference": "virglrenderer-test-server-0.9.1-1.3.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-10214",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-10214"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the virgl_resource_attach_backing function in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_ATTACH_BACKING commands.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-10214",
"url": "https://www.suse.com/security/cve/CVE-2016-10214"
},
{
"category": "external",
"summary": "SUSE Bug 1024244 for CVE-2016-10214",
"url": "https://bugzilla.suse.com/1024244"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-10214"
},
{
"cve": "CVE-2017-5937",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5937"
}
],
"notes": [
{
"category": "general",
"text": "The util_format_is_pure_uint function in vrend_renderer.c in Virgil 3d project (aka virglrenderer) 0.6.0 and earlier allows local guest OS users to cause a denial of service (NULL pointer dereference) via a crafted VIRGL_CCMD_CLEAR command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5937",
"url": "https://www.suse.com/security/cve/CVE-2017-5937"
},
{
"category": "external",
"summary": "SUSE Bug 1024232 for CVE-2017-5937",
"url": "https://bugzilla.suse.com/1024232"
},
{
"category": "external",
"summary": "SUSE Bug 1041089 for CVE-2017-5937",
"url": "https://bugzilla.suse.com/1041089"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-5937"
},
{
"cve": "CVE-2017-5957",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5957"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based buffer overflow in the vrend_decode_set_framebuffer_state function in vrend_decode.c in virglrenderer before 926b9b3460a48f6454d8bbe9e44313d86a65447f, as used in Quick Emulator (QEMU), allows a local guest users to cause a denial of service (application crash) via the \"nr_cbufs\" argument.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5957",
"url": "https://www.suse.com/security/cve/CVE-2017-5957"
},
{
"category": "external",
"summary": "SUSE Bug 1024993 for CVE-2017-5957",
"url": "https://bugzilla.suse.com/1024993"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-5957"
},
{
"cve": "CVE-2017-5993",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5993"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the vrend_renderer_init_blit_ctx function in vrend_blitter.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRGL_CCMD_BLIT commands.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5993",
"url": "https://www.suse.com/security/cve/CVE-2017-5993"
},
{
"category": "external",
"summary": "SUSE Bug 1025505 for CVE-2017-5993",
"url": "https://bugzilla.suse.com/1025505"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-5993"
},
{
"cve": "CVE-2017-5994",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5994"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the vrend_create_vertex_elements_state function in vrend_renderer.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and crash) via the num_elements parameter.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5994",
"url": "https://www.suse.com/security/cve/CVE-2017-5994"
},
{
"category": "external",
"summary": "SUSE Bug 1025507 for CVE-2017-5994",
"url": "https://bugzilla.suse.com/1025507"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-5994"
},
{
"cve": "CVE-2017-6386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-6386"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the vrend_create_vertex_elements_state function in vrend_renderer.c in virglrenderer allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRGL_OBJECT_VERTEX_ELEMENTS commands.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-6386",
"url": "https://www.suse.com/security/cve/CVE-2017-6386"
},
{
"category": "external",
"summary": "SUSE Bug 1027376 for CVE-2017-6386",
"url": "https://bugzilla.suse.com/1027376"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-6386"
},
{
"cve": "CVE-2019-18388",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18388"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via malformed commands.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18388",
"url": "https://www.suse.com/security/cve/CVE-2019-18388"
},
{
"category": "external",
"summary": "SUSE Bug 1159479 for CVE-2019-18388",
"url": "https://bugzilla.suse.com/1159479"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-18388"
},
{
"cve": "CVE-2019-18389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18389"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer overflow in the vrend_renderer_transfer_write_iov function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service, or QEMU guest-to-host escape and code execution, via VIRGL_CCMD_RESOURCE_INLINE_WRITE commands.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18389",
"url": "https://www.suse.com/security/cve/CVE-2019-18389"
},
{
"category": "external",
"summary": "SUSE Bug 1159482 for CVE-2019-18389",
"url": "https://bugzilla.suse.com/1159482"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-18389"
},
{
"cve": "CVE-2019-18390",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18390"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds read in the vrend_blit_need_swizzle function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via VIRGL_CCMD_BLIT commands.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18390",
"url": "https://www.suse.com/security/cve/CVE-2019-18390"
},
{
"category": "external",
"summary": "SUSE Bug 1159478 for CVE-2019-18390",
"url": "https://bugzilla.suse.com/1159478"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-18390"
},
{
"cve": "CVE-2019-18391",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18391"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer overflow in the vrend_renderer_transfer_write_iov function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via VIRGL_CCMD_RESOURCE_INLINE_WRITE commands.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18391",
"url": "https://www.suse.com/security/cve/CVE-2019-18391"
},
{
"category": "external",
"summary": "SUSE Bug 1159486 for CVE-2019-18391",
"url": "https://bugzilla.suse.com/1159486"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-18391"
},
{
"cve": "CVE-2019-18392",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18392"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18392",
"url": "https://www.suse.com/security/cve/CVE-2019-18392"
},
{
"category": "external",
"summary": "SUSE Bug 1159454 for CVE-2019-18392",
"url": "https://bugzilla.suse.com/1159454"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-18392"
},
{
"cve": "CVE-2020-8002",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8002"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference in vrend_renderer.c in virglrenderer through 0.8.1 allows attackers to cause a denial of service via commands that attempt to launch a grid without previously providing a Compute Shader (CS).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8002",
"url": "https://www.suse.com/security/cve/CVE-2020-8002"
},
{
"category": "external",
"summary": "SUSE Bug 1162519 for CVE-2020-8002",
"url": "https://bugzilla.suse.com/1162519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-8002"
},
{
"cve": "CVE-2020-8003",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8003"
}
],
"notes": [
{
"category": "general",
"text": "A double-free vulnerability in vrend_renderer.c in virglrenderer through 0.8.1 allows attackers to cause a denial of service by triggering texture allocation failure, because vrend_renderer_resource_allocated_texture is not an appropriate place for a free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8003",
"url": "https://www.suse.com/security/cve/CVE-2020-8003"
},
{
"category": "external",
"summary": "SUSE Bug 1162521 for CVE-2020-8003",
"url": "https://bugzilla.suse.com/1162521"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:libvirglrenderer1-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-devel-0.9.1-1.3.x86_64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.aarch64",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.ppc64le",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.s390x",
"openSUSE Tumbleweed:virglrenderer-test-server-0.9.1-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-8003"
}
]
}
OPENSUSE-SU-2020:0058-1
Vulnerability from csaf_opensuse - Published: 2020-01-14 23:14 - Updated: 2020-01-14 23:14Summary
Security update for virglrenderer
Severity
Important
Notes
Title of the patch: Security update for virglrenderer
Description of the patch: This update for virglrenderer fixes the following issues:
- CVE-2019-18388: Fixed a null pointer dereference which could have led
to denial of service (bsc#1159479).
- CVE-2019-18390: Fixed an out of bound read which could have led to
denial of service (bsc#1159478).
- CVE-2019-18389: Fixed a heap buffer overflow which could have led to
guest escape or denial of service (bsc#1159482).
- CVE-2019-18391: Fixed a heap based buffer overflow which could have led to
guest escape or denial of service (bsc#1159486).
This update was imported from the SUSE:SLE-15:Update update project.
Patchnames: openSUSE-2020-58
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for virglrenderer",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for virglrenderer fixes the following issues:\n\n- CVE-2019-18388: Fixed a null pointer dereference which could have led \n to denial of service (bsc#1159479).\n- CVE-2019-18390: Fixed an out of bound read which could have led to \n denial of service (bsc#1159478).\n- CVE-2019-18389: Fixed a heap buffer overflow which could have led to \n guest escape or denial of service (bsc#1159482).\n- CVE-2019-18391: Fixed a heap based buffer overflow which could have led to \n guest escape or denial of service (bsc#1159486). \n\nThis update was imported from the SUSE:SLE-15:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2020-58",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_0058-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2020:0058-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FZCL5SFVY3UUL6OAEA6NXNQH5OUVW7I3/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2020:0058-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FZCL5SFVY3UUL6OAEA6NXNQH5OUVW7I3/"
},
{
"category": "self",
"summary": "SUSE Bug 1159478",
"url": "https://bugzilla.suse.com/1159478"
},
{
"category": "self",
"summary": "SUSE Bug 1159479",
"url": "https://bugzilla.suse.com/1159479"
},
{
"category": "self",
"summary": "SUSE Bug 1159482",
"url": "https://bugzilla.suse.com/1159482"
},
{
"category": "self",
"summary": "SUSE Bug 1159486",
"url": "https://bugzilla.suse.com/1159486"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18388 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18388/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18389 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18390 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18390/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18391 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18391/"
}
],
"title": "Security update for virglrenderer",
"tracking": {
"current_release_date": "2020-01-14T23:14:02Z",
"generator": {
"date": "2020-01-14T23:14:02Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2020:0058-1",
"initial_release_date": "2020-01-14T23:14:02Z",
"revision_history": [
{
"date": "2020-01-14T23:14:02Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libvirglrenderer0-0.6.0-lp151.4.3.1.x86_64",
"product": {
"name": "libvirglrenderer0-0.6.0-lp151.4.3.1.x86_64",
"product_id": "libvirglrenderer0-0.6.0-lp151.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "virglrenderer-devel-0.6.0-lp151.4.3.1.x86_64",
"product": {
"name": "virglrenderer-devel-0.6.0-lp151.4.3.1.x86_64",
"product_id": "virglrenderer-devel-0.6.0-lp151.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "virglrenderer-test-server-0.6.0-lp151.4.3.1.x86_64",
"product": {
"name": "virglrenderer-test-server-0.6.0-lp151.4.3.1.x86_64",
"product_id": "virglrenderer-test-server-0.6.0-lp151.4.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.1",
"product": {
"name": "openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirglrenderer0-0.6.0-lp151.4.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libvirglrenderer0-0.6.0-lp151.4.3.1.x86_64"
},
"product_reference": "libvirglrenderer0-0.6.0-lp151.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virglrenderer-devel-0.6.0-lp151.4.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:virglrenderer-devel-0.6.0-lp151.4.3.1.x86_64"
},
"product_reference": "virglrenderer-devel-0.6.0-lp151.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "virglrenderer-test-server-0.6.0-lp151.4.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:virglrenderer-test-server-0.6.0-lp151.4.3.1.x86_64"
},
"product_reference": "virglrenderer-test-server-0.6.0-lp151.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-18388",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18388"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via malformed commands.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:libvirglrenderer0-0.6.0-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:virglrenderer-devel-0.6.0-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:virglrenderer-test-server-0.6.0-lp151.4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18388",
"url": "https://www.suse.com/security/cve/CVE-2019-18388"
},
{
"category": "external",
"summary": "SUSE Bug 1159479 for CVE-2019-18388",
"url": "https://bugzilla.suse.com/1159479"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:libvirglrenderer0-0.6.0-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:virglrenderer-devel-0.6.0-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:virglrenderer-test-server-0.6.0-lp151.4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:libvirglrenderer0-0.6.0-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:virglrenderer-devel-0.6.0-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:virglrenderer-test-server-0.6.0-lp151.4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T23:14:02Z",
"details": "moderate"
}
],
"title": "CVE-2019-18388"
},
{
"cve": "CVE-2019-18389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18389"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer overflow in the vrend_renderer_transfer_write_iov function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service, or QEMU guest-to-host escape and code execution, via VIRGL_CCMD_RESOURCE_INLINE_WRITE commands.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:libvirglrenderer0-0.6.0-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:virglrenderer-devel-0.6.0-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:virglrenderer-test-server-0.6.0-lp151.4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18389",
"url": "https://www.suse.com/security/cve/CVE-2019-18389"
},
{
"category": "external",
"summary": "SUSE Bug 1159482 for CVE-2019-18389",
"url": "https://bugzilla.suse.com/1159482"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:libvirglrenderer0-0.6.0-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:virglrenderer-devel-0.6.0-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:virglrenderer-test-server-0.6.0-lp151.4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:libvirglrenderer0-0.6.0-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:virglrenderer-devel-0.6.0-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:virglrenderer-test-server-0.6.0-lp151.4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T23:14:02Z",
"details": "important"
}
],
"title": "CVE-2019-18389"
},
{
"cve": "CVE-2019-18390",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18390"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds read in the vrend_blit_need_swizzle function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via VIRGL_CCMD_BLIT commands.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:libvirglrenderer0-0.6.0-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:virglrenderer-devel-0.6.0-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:virglrenderer-test-server-0.6.0-lp151.4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18390",
"url": "https://www.suse.com/security/cve/CVE-2019-18390"
},
{
"category": "external",
"summary": "SUSE Bug 1159478 for CVE-2019-18390",
"url": "https://bugzilla.suse.com/1159478"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:libvirglrenderer0-0.6.0-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:virglrenderer-devel-0.6.0-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:virglrenderer-test-server-0.6.0-lp151.4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:libvirglrenderer0-0.6.0-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:virglrenderer-devel-0.6.0-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:virglrenderer-test-server-0.6.0-lp151.4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T23:14:02Z",
"details": "moderate"
}
],
"title": "CVE-2019-18390"
},
{
"cve": "CVE-2019-18391",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18391"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer overflow in the vrend_renderer_transfer_write_iov function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via VIRGL_CCMD_RESOURCE_INLINE_WRITE commands.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:libvirglrenderer0-0.6.0-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:virglrenderer-devel-0.6.0-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:virglrenderer-test-server-0.6.0-lp151.4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18391",
"url": "https://www.suse.com/security/cve/CVE-2019-18391"
},
{
"category": "external",
"summary": "SUSE Bug 1159486 for CVE-2019-18391",
"url": "https://bugzilla.suse.com/1159486"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:libvirglrenderer0-0.6.0-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:virglrenderer-devel-0.6.0-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:virglrenderer-test-server-0.6.0-lp151.4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:libvirglrenderer0-0.6.0-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:virglrenderer-devel-0.6.0-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:virglrenderer-test-server-0.6.0-lp151.4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T23:14:02Z",
"details": "important"
}
],
"title": "CVE-2019-18391"
}
]
}
BDU:2020-00553
Vulnerability from fstec - Published: 23.12.2019
VLAI Severity ?
Title
Уязвимость функции vrend_blit_need_swizzle (vrend_renderer.c) библиотеки virglrenderer, позволяющая нарушителю вызвать отказ в обслуживании
Description
Уязвимость функции vrend_blit_need_swizzle (vrend_renderer.c) библиотеки virglrenderer связана с чтением за границами буфера в динамической памяти. Эксплуатация уязвимости может позволить нарушителю вызвать отказ в обслуживании с помощью команд VIRGL_CCMD_BLIT
Severity ?
Vendor
Novell Inc., Red Hat Inc., virglrenderer project, ООО «РусБИТех-Астра», АО «ИВК», АО "НППКТ"
Software Name
Suse Linux Enterprise Desktop, SUSE Linux Enterprise Server for SAP Applications, SUSE Linux Enterprise Software Development Kit, SUSE OpenStack Cloud, Suse Linux Enterprise Server, Red Hat Enterprise Linux, SUSE Linux Enterprise Module for Open Buildservice Development Tools, SUSE Enterprise Storage, SUSE Linux Enterprise Point of Sale, OpenSUSE Leap, SUSE Linux Enterprise Module for Server Applications, SUSE OpenStack Cloud Crowbar, HPE Helion Openstack, virglrenderer, Astra Linux Special Edition (запись в едином реестре российских программ №369), Альт 8 СП (запись в едином реестре российских программ №4305), ОСОН ОСнова Оnyx (запись в едином реестре российских программ №5913)
Software Version
12 SP4 (Suse Linux Enterprise Desktop), 12 SP2 (SUSE Linux Enterprise Server for SAP Applications), 12 SP2-BCL (SUSE Linux Enterprise Server for SAP Applications), 12 SP2-ESPOS (SUSE Linux Enterprise Server for SAP Applications), 12 SP2-LTSS (SUSE Linux Enterprise Server for SAP Applications), 12 SP3 (SUSE Linux Enterprise Server for SAP Applications), 12 SP4 (SUSE Linux Enterprise Server for SAP Applications), 12 SP4 (SUSE Linux Enterprise Software Development Kit), 7 (SUSE OpenStack Cloud), 12 SP4 (Suse Linux Enterprise Server), 8.0 (Red Hat Enterprise Linux), 15 (SUSE Linux Enterprise Module for Open Buildservice Development Tools), 5 (SUSE Enterprise Storage), 12 SP2-CLIENT (SUSE Linux Enterprise Point of Sale), 12 SP2-BCL (Suse Linux Enterprise Server), 12 SP2-ESPOS (Suse Linux Enterprise Server), 15 SP1 (SUSE Linux Enterprise Module for Open Buildservice Development Tools), 15.1 (OpenSUSE Leap), 12 SP2-LTSS (Suse Linux Enterprise Server), 12 SP3-LTSS (Suse Linux Enterprise Server), 15 SP1 (SUSE Linux Enterprise Module for Server Applications), 15 (SUSE Linux Enterprise Module for Server Applications), 8 (SUSE OpenStack Cloud), 12 SP3-BCL (Suse Linux Enterprise Server), 12 SP5 (Suse Linux Enterprise Server), 12 SP3-BCL (SUSE Linux Enterprise Server for SAP Applications), 12 SP3-LTSS (SUSE Linux Enterprise Server for SAP Applications), 12 SP5 (SUSE Linux Enterprise Server for SAP Applications), 12 SP5 (SUSE Linux Enterprise Software Development Kit), 8 (SUSE OpenStack Cloud Crowbar), 8 (HPE Helion Openstack), 12 SP3-ESPOS (Suse Linux Enterprise Server), 12 SP3-ESPOS (SUSE Linux Enterprise Server for SAP Applications), до 0.8.0 включительно (virglrenderer), 1.7 (Astra Linux Special Edition), - (Альт 8 СП), 4.7 (Astra Linux Special Edition), до 2.7 (ОСОН ОСнова Оnyx)
Possible Mitigations
Использование рекомендаций:
Для virglrenderer:
https://gitlab.freedesktop.org/virgl/virglrenderer/commit/24f67de7a9088a873844a39be03cee6882260ac9
https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/314/diffs?commit_id=d2cdbcf6a8f2317f250fd54f08aa35dde2fa3e30#3cd772559e0d73afa136d6818023cfd0c4c8ecc0_0_151
Для программных продуктов Novell Inc.:
https://www.suse.com/security/cve/CVE-2019-18390/
https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html
Для программных продуктов Red Hat Inc.:
https://access.redhat.com/security/cve/cve-2019-18390
https://bugzilla.redhat.com/show_bug.cgi?id=1765584
Для ОСОН ОСнова Оnyx (версия 2.7):
Обновление программного обеспечения virglrenderer до версии 0.7.0-2+deb10u1
Для ОС Astra Linux Special Edition 4.7 для архитектуры ARM:
использование рекомендаций производителя: https://wiki.astralinux.ru/astra-linux-se47-bulletin-2023-0131SE47MD
Для ОС Альт 8 СП: установка обновления из публичного репозитория программного средства
Для ОС Astra Linux Special Edition 1.7:
обновить пакет virglrenderer до 0.7.0-2+deb10u1 или более высокой версии, используя рекомендации производителя: https://wiki.astralinux.ru/astra-linux-se17-bulletin-2022-0819SE17
Reference
https://www.suse.com/security/cve/CVE-2019-18390/
https://nvd.nist.gov/vuln/detail/CVE-2019-18390
https://bugzilla.redhat.com/show_bug.cgi?id=1765584
https://gitlab.freedesktop.org/virgl/virglrenderer/commit/24f67de7a9088a873844a39be03cee6882260ac9
https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/314/diffs?commit_id=d2cdbcf6a8f2317f250fd54f08aa35dde2fa3e30#3cd772559e0d73afa136d6818023cfd0c4c8ecc0_0_151
https://gitlab.freedesktop.org/virgl/virglrenderer/commit/24f67de7a9088a873844a39be03cee6882260ac9
https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html
https://поддержка.нппкт.рф/bin/view/ОСнова/Обновления/2.7/
https://wiki.astralinux.ru/astra-linux-se47-bulletin-2023-0131SE47MD
https://altsp.su/obnovleniya-bezopasnosti/
CWE
CWE-125
{
"CVSS 2.0": "AV:L/AC:L/Au:S/C:C/I:N/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Novell Inc., Red Hat Inc., virglrenderer project, \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb, \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\"",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "12 SP4 (Suse Linux Enterprise Desktop), 12 SP2 (SUSE Linux Enterprise Server for SAP Applications), 12 SP2-BCL (SUSE Linux Enterprise Server for SAP Applications), 12 SP2-ESPOS (SUSE Linux Enterprise Server for SAP Applications), 12 SP2-LTSS (SUSE Linux Enterprise Server for SAP Applications), 12 SP3 (SUSE Linux Enterprise Server for SAP Applications), 12 SP4 (SUSE Linux Enterprise Server for SAP Applications), 12 SP4 (SUSE Linux Enterprise Software Development Kit), 7 (SUSE OpenStack Cloud), 12 SP4 (Suse Linux Enterprise Server), 8.0 (Red Hat Enterprise Linux), 15 (SUSE Linux Enterprise Module for Open Buildservice Development Tools), 5 (SUSE Enterprise Storage), 12 SP2-CLIENT (SUSE Linux Enterprise Point of Sale), 12 SP2-BCL (Suse Linux Enterprise Server), 12 SP2-ESPOS (Suse Linux Enterprise Server), 15 SP1 (SUSE Linux Enterprise Module for Open Buildservice Development Tools), 15.1 (OpenSUSE Leap), 12 SP2-LTSS (Suse Linux Enterprise Server), 12 SP3-LTSS (Suse Linux Enterprise Server), 15 SP1 (SUSE Linux Enterprise Module for Server Applications), 15 (SUSE Linux Enterprise Module for Server Applications), 8 (SUSE OpenStack Cloud), 12 SP3-BCL (Suse Linux Enterprise Server), 12 SP5 (Suse Linux Enterprise Server), 12 SP3-BCL (SUSE Linux Enterprise Server for SAP Applications), 12 SP3-LTSS (SUSE Linux Enterprise Server for SAP Applications), 12 SP5 (SUSE Linux Enterprise Server for SAP Applications), 12 SP5 (SUSE Linux Enterprise Software Development Kit), 8 (SUSE OpenStack Cloud Crowbar), 8 (HPE Helion Openstack), 12 SP3-ESPOS (Suse Linux Enterprise Server), 12 SP3-ESPOS (SUSE Linux Enterprise Server for SAP Applications), \u0434\u043e 0.8.0 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (virglrenderer), 1.7 (Astra Linux Special Edition), - (\u0410\u043b\u044c\u0442 8 \u0421\u041f), 4.7 (Astra Linux Special Edition), \u0434\u043e 2.7 (\u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f virglrenderer:\nhttps://gitlab.freedesktop.org/virgl/virglrenderer/commit/24f67de7a9088a873844a39be03cee6882260ac9\nhttps://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/314/diffs?commit_id=d2cdbcf6a8f2317f250fd54f08aa35dde2fa3e30#3cd772559e0d73afa136d6818023cfd0c4c8ecc0_0_151\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Novell Inc.:\nhttps://www.suse.com/security/cve/CVE-2019-18390/\nhttps://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://access.redhat.com/security/cve/cve-2019-18390\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1765584\n\n\u0414\u043b\u044f \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx (\u0432\u0435\u0440\u0441\u0438\u044f 2.7):\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f virglrenderer \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 0.7.0-2+deb10u1\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux Special Edition 4.7 \u0434\u043b\u044f \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u044b ARM:\n\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se47-bulletin-2023-0131SE47MD\n\n\u0414\u043b\u044f \u041e\u0421 \u0410\u043b\u044c\u0442 8 \u0421\u041f: \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u0437 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u0433\u043e \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux Special Edition 1.7:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 virglrenderer \u0434\u043e 0.7.0-2+deb10u1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se17-bulletin-2022-0819SE17",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "23.12.2019",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "24.09.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "11.02.2020",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2020-00553",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2019-18390",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Suse Linux Enterprise Desktop, SUSE Linux Enterprise Server for SAP Applications, SUSE Linux Enterprise Software Development Kit, SUSE OpenStack Cloud, Suse Linux Enterprise Server, Red Hat Enterprise Linux, SUSE Linux Enterprise Module for Open Buildservice Development Tools, SUSE Enterprise Storage, SUSE Linux Enterprise Point of Sale, OpenSUSE Leap, SUSE Linux Enterprise Module for Server Applications, SUSE OpenStack Cloud Crowbar, HPE Helion Openstack, virglrenderer, Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u0410\u043b\u044c\u0442 8 \u0421\u041f (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164305), \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Red Hat Inc. Red Hat Enterprise Linux 8.0 , Novell Inc. OpenSUSE Leap 15.1 , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.7 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb \u0410\u043b\u044c\u0442 8 \u0421\u041f - (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164305), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 4.7 ARM (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\" \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx \u0434\u043e 2.7 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 vrend_blit_need_swizzle (vrend_renderer.c) \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 virglrenderer, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0427\u0442\u0435\u043d\u0438\u0435 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u0431\u0443\u0444\u0435\u0440\u0430 (CWE-125)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 vrend_blit_need_swizzle (vrend_renderer.c) \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 virglrenderer \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0447\u0442\u0435\u043d\u0438\u0435\u043c \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u0434\u0438\u043d\u0430\u043c\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u043f\u0430\u043c\u044f\u0442\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u043a\u043e\u043c\u0430\u043d\u0434 VIRGL_CCMD_BLIT",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.suse.com/security/cve/CVE-2019-18390/\nhttps://nvd.nist.gov/vuln/detail/CVE-2019-18390\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1765584\nhttps://gitlab.freedesktop.org/virgl/virglrenderer/commit/24f67de7a9088a873844a39be03cee6882260ac9\nhttps://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/314/diffs?commit_id=d2cdbcf6a8f2317f250fd54f08aa35dde2fa3e30#3cd772559e0d73afa136d6818023cfd0c4c8ecc0_0_151\nhttps://gitlab.freedesktop.org/virgl/virglrenderer/commit/24f67de7a9088a873844a39be03cee6882260ac9\nhttps://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html\nhttps://\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430.\u043d\u043f\u043f\u043a\u0442.\u0440\u0444/bin/view/\u041e\u0421\u043d\u043e\u0432\u0430/\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f/2.7/\nhttps://wiki.astralinux.ru/astra-linux-se47-bulletin-2023-0131SE47MD\nhttps://altsp.su/obnovleniya-bezopasnosti/",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-125",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,2)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,1)"
}
Loading…
Show additional events:
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…