A flaw was found in the way target domain permission check was performed when cloning a VM from a snapshot. An attacker can use this flaw to conduct denial of service attack on the target domain by exhausting the available free space.
Acknowledgements:
This issue was discovered by Daniel Erez of the Red Hat Enterprise Virtualization Team.