Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2016-9923

Published: 23 December 2016

Quick Emulator (Qemu) built with the 'chardev' backend support is vulnerable to a use after free issue. It could occur while hotplug and unplugging the device in the guest. A guest user/process could use this flaw to crash a Qemu process on the host resulting in DoS.

Notes

AuthorNote
mdeslaur
complex backport, we're not going to dix this in xenial and
older

Priority

Low

Cvss 3 Severity Score

5.5

Score breakdown

Status

Package Release Status
qemu
Launchpad, Ubuntu, Debian
artful Not vulnerable
(1:2.8+dfsg-3ubuntu2)
precise Does not exist

trusty Ignored

upstream Needed

xenial Ignored

yakkety Ignored
(end of life)
zesty Not vulnerable
(1:2.8+dfsg-3ubuntu2)
Patches:
upstream: http://git.qemu-project.org/?p=qemu.git;a=commit;h=a4afa548fc6dd9842ed86639b4d37d4d1c4ad480
qemu-kvm
Launchpad, Ubuntu, Debian
artful Does not exist

precise Ignored
(end of life)
trusty Does not exist

upstream Needed

xenial Does not exist

yakkety Does not exist

zesty Does not exist

Severity score breakdown

Parameter Value
Base score 5.5
Attack vector Local
Attack complexity Low
Privileges required Low
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H