Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-9846

Опубликовано: 29 дек. 2016
Источник: ubuntu
Приоритет: low
CVSS2: 4.9
CVSS3: 6.5

Описание

QEMU (aka Quick Emulator) built with the Virtio GPU Device emulator support is vulnerable to a memory leakage issue. It could occur while updating the cursor data in update_cursor_data_virgl. A guest user/process could use this flaw to leak host memory bytes, resulting in DoS for a host.

РелизСтатусПримечание
devel

not-affected

1:2.8+dfsg-3ubuntu2
esm-infra-legacy/trusty

not-affected

code not present
esm-infra/xenial

released

1:2.5+dfsg-5ubuntu10.11
precise

DNE

trusty

not-affected

code not present
trusty/esm

not-affected

code not present
upstream

needed

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

xenial

released

1:2.5+dfsg-5ubuntu10.11

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

not-affected

code not present
trusty

DNE

trusty/esm

DNE

upstream

needed

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

xenial

DNE

yakkety

DNE

Показывать по

4.9 Medium

CVSS2

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 3
redhat
больше 9 лет назад

QEMU (aka Quick Emulator) built with the Virtio GPU Device emulator support is vulnerable to a memory leakage issue. It could occur while updating the cursor data in update_cursor_data_virgl. A guest user/process could use this flaw to leak host memory bytes, resulting in DoS for a host.

CVSS3: 6.5
nvd
около 9 лет назад

QEMU (aka Quick Emulator) built with the Virtio GPU Device emulator support is vulnerable to a memory leakage issue. It could occur while updating the cursor data in update_cursor_data_virgl. A guest user/process could use this flaw to leak host memory bytes, resulting in DoS for a host.

CVSS3: 6.5
debian
около 9 лет назад

QEMU (aka Quick Emulator) built with the Virtio GPU Device emulator su ...

CVSS3: 6.5
github
больше 3 лет назад

QEMU (aka Quick Emulator) built with the Virtio GPU Device emulator support is vulnerable to a memory leakage issue. It could occur while updating the cursor data in update_cursor_data_virgl. A guest user/process could use this flaw to leak host memory bytes, resulting in DoS for a host.

fstec
около 9 лет назад

Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать аварийное завершение работы приложения

4.9 Medium

CVSS2

6.5 Medium

CVSS3