Quick Emulator(Qemu) built with the keyboard input event handlers support is vulnerable to a host memory leakage issue. It could occur if a guest user was to generate large keyboard events, faster than Qemu could process them. A privileged user inside guest could use this flaw to exhaust host memory, resulting in DoS. Upstream patch: --------------- -> https://lists.gnu.org/archive/html/qemu-devel/2017-04/msg05599.html Reference: ---------- -> http://www.openwall.com/lists/oss-security/2017/05/03/2
*** This bug has been marked as a duplicate of bug 616872 ***