Medium severity6.5NVD Advisory· Published Dec 29, 2016· Updated May 6, 2026
CVE-2016-9846
CVE-2016-9846
Description
QEMU (aka Quick Emulator) built with the Virtio GPU Device emulator support is vulnerable to a memory leakage issue. It could occur while updating the cursor data in update_cursor_data_virgl. A guest user/process could use this flaw to leak host memory bytes, resulting in DoS for a host.
Affected products
8- osv-coords4 versionspkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2
< 2.6.2-39.1+ 3 more
- (no CPE)range: < 2.6.2-39.1
- (no CPE)range: < 2.6.2-39.1
- (no CPE)range: < 2.6.2-39.1
- (no CPE)range: < 2.6.2-39.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- lists.gnu.org/archive/html/qemu-devel/2016-11/msg00029.htmlnvdPatchVendor Advisory
- www.openwall.com/lists/oss-security/2016/12/05/18nvdMailing ListThird Party Advisory
- www.openwall.com/lists/oss-security/2016/12/05/23nvdMailing ListThird Party Advisory
- www.securityfocus.com/bid/94765nvdThird Party AdvisoryVDB Entry
- security.gentoo.org/glsa/201701-49nvdThird Party Advisory
News mentions
0No linked articles in our index yet.