First published: Fri Jan 20 2017(Updated: )
Memory leak in hw/watchdog/wdt_i6300esb.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=2.8.1.1 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10155 is classified with a high severity due to its potential to cause denial of service attacks by exhausting host memory.
To mitigate CVE-2016-10155, update your QEMU installation to a version later than 2.8.1.1.
CVE-2016-10155 affects QEMU versions up to 2.8.1.1 and Debian Linux 8.0.
CVE-2016-10155 is caused by a memory leak during a large number of device unplug operations in the QEMU virtual hardware watchdog.
CVE-2016-10155 requires local guest OS privileges to exploit, meaning it cannot be directly exploited remotely.