Quick Emulator (Qemu) built with the USB redirector usb-guest support is vulnerable to a memory leakage flaw. It could occur while destroying the USB redirector in 'usbredir_handle_destroy'. A guest user/process could use this issue to leak host memory, resulting in DoS for a host.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1497-1 | qemu security update |
EUVD |
EUVD-2016-10696 | Quick Emulator (Qemu) built with the USB redirector usb-guest support is vulnerable to a memory leakage flaw. It could occur while destroying the USB redirector in 'usbredir_handle_destroy'. A guest user/process could use this issue to leak host memory, resulting in DoS for a host. |
Ubuntu USN |
USN-3261-1 | QEMU vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T03:07:31.326Z
Reserved: 2016-12-08T00:00:00
Link: CVE-2016-9907
No data.
Status : Deferred
Published: 2016-12-23T22:59:00.410
Modified: 2025-04-12T10:46:40.837
Link: CVE-2016-9907
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN