From ${URL}: Hello, Qemu emulator built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to a memory leakage flaw. It occurs when a guest repeatedly tries to activate the vmxnet3 device. A privileged guest user could use this flaw to leak host memory, resulting in DoS on the host. Upstream patch: --------------- -> https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02299.html This issue was discovered by Qinghao Tang of QIHU 360 Marvel Team. Thank you. -- Prasad J Pandit / Red Hat Product Security Team 47AF CE69 3A90 54AA 9045 1053 DD13 3D32 FE5B 041F
*** This bug has been marked as a duplicate of bug 567868 ***