Qemu through 2.10.0 allows remote attackers to cause a memory leak by triggering slow data-channel read operations, related to io/channel-websock.c.
The product does not release a resource after its effective lifetime has ended, i.e., after the resource is no longer needed.
Link | Tags |
---|---|
https://www.debian.org/security/2018/dsa-4213 | vendor advisory |
https://access.redhat.com/errata/RHSA-2018:0816 | vendor advisory |
http://www.securityfocus.com/bid/101277 | vdb entry third party advisory |
https://access.redhat.com/errata/RHSA-2018:1104 | vendor advisory |
https://bugs.launchpad.net/qemu/+bug/1718964 | issue tracking patch exploit third party advisory |
https://usn.ubuntu.com/3575-1/ | vendor advisory |
https://lists.gnu.org/archive/html/qemu-devel/2017-10/msg02278.html | mailing list third party advisory patch |