Virgil 3d project, used by Quick Emulator(Qemu) to implement 3D GPU support
for the virtio GPU, is vulnerable to an OOB array access issue. It could occur
when parsing texture instructions in parse_instruction().
A guest user/process could use this flaw to crash the Qemu process instance
Name: Li Qiang (360.cn Inc.)
Created virglrenderer tracking bugs for this issue:
Affects: fedora-all [bug 1415987]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.