QEMU is vulnerable to denial of service. The Quick Emulator (QEMU) built with the Network Block Device (NBD) Server support is vulnerable to a crash via a SIGPIPE signal. The crash can occur if a client aborts a connection due to any failure during negotiation or read operation. A remote user/process could use this flaw to crash the qemu-nbd server resulting in a Denial of Service (DoS).
www.debian.org/security/2017/dsa-3920
www.openwall.com/lists/oss-security/2017/06/29/1
www.securityfocus.com/bid/99513
access.redhat.com/errata/RHSA-2017:2390
access.redhat.com/errata/RHSA-2017:2445
access.redhat.com/errata/RHSA-2017:3466
access.redhat.com/errata/RHSA-2017:3470
access.redhat.com/errata/RHSA-2017:3471
access.redhat.com/errata/RHSA-2017:3472
access.redhat.com/errata/RHSA-2017:3473
access.redhat.com/errata/RHSA-2017:3474
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=1466190
bugzilla.redhat.com/show_bug.cgi?id=1471076
bugzilla.redhat.com/show_bug.cgi?id=1473145
lists.debian.org/debian-lts-announce/2018/11/msg00038.html
lists.gnu.org/archive/html/qemu-devel/2017-06/msg02693.html