CVE-2016-9846 (retired)

Priority
Description
QEMU (aka Quick Emulator) built with the Virtio GPU Device emulator support
is vulnerable to a memory leakage issue. It could occur while updating the
cursor data in update_cursor_data_virgl. A guest user/process could use
this flaw to leak host memory bytes, resulting in DoS for a host.
Package
Source: qemu (LP Ubuntu Debian)
Upstream:needed
Ubuntu 14.04 LTS (Trusty Tahr):not-affected (code not present)
Ubuntu 16.04 LTS (Xenial Xerus):released (1:2.5+dfsg-5ubuntu10.11)
Patches:
Upstream:http://git.qemu-project.org/?p=qemu.git;a=commit;h=2d1cd6c7a91a4beb99a0c3a21be529222a708545
Package
Upstream:needed
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
More Information

Updated: 2019-03-26 12:23:42 UTC (commit ccdecfcf0fead22bd291e5f4ea745a46872dcb15)