{"id":"CVE-2019-18390","details":"An out-of-bounds read in the vrend_blit_need_swizzle function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via VIRGL_CCMD_BLIT commands.","modified":"2026-04-11T09:39:40.739536Z","published":"2019-12-23T16:15:11.243Z","related":["SUSE-SU-2020:0016-1","SUSE-SU-2020:0017-1","openSUSE-SU-2020:0058-1","openSUSE-SU-2024:11499-1"],"references":[{"type":"ADVISORY","url":"https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/314/diffs?commit_id=d2cdbcf6a8f2317f250fd54f08aa35dde2fa3e30#3cd772559e0d73afa136d6818023cfd0c4c8ecc0_0_151"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00017.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html"},{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/cve-2019-18390"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1765584"},{"type":"FIX","url":"https://gitlab.freedesktop.org/virgl/virglrenderer/commit/24f67de7a9088a873844a39be03cee6882260ac9"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.freedesktop.org/virgl/virglrenderer","events":[{"introduced":"0"},{"last_affected":"48cc96c9aebb9d0164830a157efc8916f08f00c0"},{"fixed":"24f67de7a9088a873844a39be03cee6882260ac9"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"0.8.0"}]}}],"versions":["virglrenderer-0.2.0","virglrenderer-0.4.0","virglrenderer-0.5.0","virglrenderer-0.6.0","virglrenderer-0.7.0","virglrenderer-0.8.0"],"database_specific":{"vanir_signatures_modified":"2026-04-11T09:39:40Z","vanir_signatures":[{"id":"CVE-2019-18390-1dd0f6fb","signature_version":"v1","signature_type":"Line","target":{"file":"src/virgl_hw.h"},"source":"https://gitlab.freedesktop.org/virgl/virglrenderer@24f67de7a9088a873844a39be03cee6882260ac9","deprecated":false,"digest":{"threshold":0.9,"line_hashes":["295718410517094950528114583803510995894","43468277317181871649856080072575986996","249655131899309062348327631190168477966"]}},{"id":"CVE-2019-18390-6bbeadc1","signature_version":"v1","signature_type":"Line","target":{"file":"src/vrend_renderer.c"},"source":"https://gitlab.freedesktop.org/virgl/virglrenderer@24f67de7a9088a873844a39be03cee6882260ac9","deprecated":false,"digest":{"threshold":0.9,"line_hashes":["203327541951848299864613017926910193462","42597155943745953960949306703066152174","163259354468978262870234779266794485686","104382142299863661724756600661953964042","195073412259000187659366091482833080495","221501829541838785924229101314879422744","272004653704100493015803223915055268624"]}},{"id":"CVE-2019-18390-e6c43cf8","signature_version":"v1","signature_type":"Function","target":{"function":"vrend_renderer_blit","file":"src/vrend_renderer.c"},"source":"https://gitlab.freedesktop.org/virgl/virglrenderer@24f67de7a9088a873844a39be03cee6882260ac9","deprecated":false,"digest":{"length":2421,"function_hash":"103917660898869094351024064010480370128"}}],"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"15.1"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-18390.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"}]}