6.5
CVSSv3

CVE-2016-9846

Published: 29/12/2016 Updated: 10/11/2020
CVSS v2 Base Score: 4.9 | Impact Score: 6.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 6.5 | Impact Score: 4 | Exploitability Score: 2
VMScore: 436
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

QEMU (aka Quick Emulator) built with the Virtio GPU Device emulator support is vulnerable to a memory leakage issue. It could occur while updating the cursor data in update_cursor_data_virgl. A guest user/process could use this flaw to leak host memory bytes, resulting in DoS for a host.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

qemu qemu

qemu qemu 2.8.0

Vendor Advisories

Debian Bug report logs - #847382 qemu: CVE-2016-9846: display: virtio-gpu: memory leakage while updating cursor Package: src:qemu; Maintainer for src:qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 7 Dec 2016 18:30:04 UTC Severity: i ...
Several security issues were fixed in QEMU ...
QEMU (aka Quick Emulator) built with the Virtio GPU Device emulator support is vulnerable to a memory leakage issue It could occur while updating the cursor data in update_cursor_data_virgl A guest user/process could use this flaw to leak host memory bytes, resulting in DoS for a host ...