Virgil 3d project, used by Quick Emulator(Qemu) to implement 3D GPU support for the virtio GPU, is vulnerable to an OOB array access issue. It could occur when in vrend_draw_vbo. A guest user/process could use this flaw to crash the Qemu process instance resulting DoS. Upstream patch: --------------- -> https://cgit.freedesktop.org/virglrenderer/commit/?id=a5ac49940c40ae415eac0cf912eac7070b4ba95d Reference: ---------- -> http://www.openwall.com/lists/oss-security/2017/02/13/2
Acknowledgments: Name: Li Qiang (360.cn Inc.)
Created virglrenderer tracking bugs for this issue: Affects: fedora-all [bug 1421074]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.