Virgil 3d project, used by Quick Emulator(Qemu) to implement 3D GPU support for the virtio GPU, is vulnerable to an OOB array access issue. It could occur when parsing texture instructions in parse_instruction(). A guest user/process could use this flaw to crash the Qemu process instance resulting DoS. Upstream patch: --------------- -> https://lists.freedesktop.org/archives/virglrenderer-devel/2017-January/000105.html
Acknowledgments: Name: Li Qiang (360.cn Inc.)
Created virglrenderer tracking bugs for this issue: Affects: fedora-all [bug 1415987]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.