QEMU is vulnerable to denial of service. A memory leak in hw/9pfs/9p-proxy.c
allows local privileged guest OS users to crash the application by via a missing cleanup operation in the proxy backend.
git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=898ae90a44551d25b8e956fd87372d303c82fe68
git.qemu.org/?p=qemu.git;a=commit;h=898ae90a44551d25b8e956fd87372d303c82fe68
www.openwall.com/lists/oss-security/2016/12/06/11
www.openwall.com/lists/oss-security/2016/12/08/7
www.securityfocus.com/bid/94729
lists.debian.org/debian-lts-announce/2018/09/msg00007.html
lists.gnu.org/archive/html/qemu-devel/2016-11/msg03278.html
security.gentoo.org/glsa/201701-49