Quick Emulator (Qemu) built with the USB redirector usb-guest support is vulnerable to a memory leakage flaw. It could occur while destroying the USB redirector in 'usbredir_handle_destroy'. A guest user/process could use this issue to leak host memory, resulting in DoS for a host.
2016-12-23T22:59:00.410
2025-04-12T10:46:40.837
Deferred
CVSSv3.1: 6.5 (MEDIUM)
AV:L/AC:L/Au:N/C:N/I:N/A:C
3.9
6.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | qemu | qemu | ≤ 2.7.1 | Yes |
Operating System | debian | debian_linux | 8.0 | Yes |
Application | redhat | openstack | 6.0 | Yes |
Application | redhat | openstack | 7.0 | Yes |
Application | redhat | openstack | 8 | Yes |
Application | redhat | openstack | 9 | Yes |
Application | redhat | openstack | 10 | Yes |
Application | redhat | openstack | 11 | Yes |
Application | redhat | virtualization | 4.0 | Yes |
Operating System | redhat | enterprise_linux | 7.0 | No |