+-- On Thu, 8 Aug 2019, Paolo Bonzini wrote --+ | I am not sure this is worth a CVE.
True, it is a low one, as QEMU consumes cycles on the host. | The kernel can cause QEMU to break, but is there a practical case in which | an unprivileged user can do that? QEMU does not break, it keeps running in interruptible sleep 'S' state. They've a reproducer wherein guest does mmio calls to trigger the issue. Thank you. -- Prasad J Pandit / Red Hat Product Security Team 47AF CE69 3A90 54AA 9045 1053 DD13 3D32 FE5B 041F