QEMU is vulnerable to denial of service (DoS) attacks. An out-of-bounds read-write access error could occur while doing pci_dma_read/write calls. A privileged user could use this flaw to crash the guest instance.
git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=b242e0e0e2969c044a318e56f7988bbd84de1f63
git.qemu.org/?p=qemu.git;a=commit;h=b242e0e0e2969c044a318e56f7988bbd84de1f63
rhn.redhat.com/errata/RHSA-2016-2670.html
rhn.redhat.com/errata/RHSA-2016-2671.html
rhn.redhat.com/errata/RHSA-2016-2704.html
rhn.redhat.com/errata/RHSA-2016-2705.html
rhn.redhat.com/errata/RHSA-2016-2706.html
www.openwall.com/lists/oss-security/2016/03/01/1
www.openwall.com/lists/oss-security/2016/03/01/10
access.redhat.com/errata/RHSA-2016:2670
access.redhat.com/errata/RHSA-2016:2671
access.redhat.com/errata/RHSA-2016:2704
access.redhat.com/errata/RHSA-2016:2705
access.redhat.com/errata/RHSA-2016:2706
access.redhat.com/security/cve/CVE-2015-8818
access.redhat.com/security/cve/CVE-2016-2857
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=1300771
bugzilla.redhat.com/show_bug.cgi?id=1374366
bugzilla.redhat.com/show_bug.cgi?id=1386383
rhn.redhat.com/errata/RHSA-2016-2670.html