Quick Emulator (Qemu) built with the USB redirector usb-guest support is vulnerable to a memory leakage flaw. It could occur while destroying the USB redirector in 'usbredir_handle_destroy'. A guest user/process could use this issue to leak host memory, resulting in DoS for a host.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-1497-1 | qemu security update |
![]() |
EUVD-2016-10696 | Quick Emulator (Qemu) built with the USB redirector usb-guest support is vulnerable to a memory leakage flaw. It could occur while destroying the USB redirector in 'usbredir_handle_destroy'. A guest user/process could use this issue to leak host memory, resulting in DoS for a host. |
![]() |
USN-3261-1 | QEMU vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T03:07:31.326Z
Reserved: 2016-12-08T00:00:00
Link: CVE-2016-9907

No data.

Status : Deferred
Published: 2016-12-23T22:59:00.410
Modified: 2025-04-12T10:46:40.837
Link: CVE-2016-9907


No data.