The address_space_write_continue function in exec.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds access and guest instance crash) by leveraging use of qemu_map_ram_ptr to access guest ram block area.
www.debian.org/security/2017/dsa-3925
www.openwall.com/lists/oss-security/2017/07/17/4
www.securityfocus.com/bid/99895
access.redhat.com/errata/RHSA-2017:3369
access.redhat.com/errata/RHSA-2017:3466
access.redhat.com/errata/RHSA-2017:3470
access.redhat.com/errata/RHSA-2017:3471
access.redhat.com/errata/RHSA-2017:3472
access.redhat.com/errata/RHSA-2017:3473
access.redhat.com/errata/RHSA-2017:3474
bugzilla.redhat.com/show_bug.cgi?id=1471638
lists.gnu.org/archive/html/qemu-devel/2017-07/msg03775.html
usn.ubuntu.com/3575-1/