CVE-2016-9923Use After Free in Qemu

CWE-416Use After Free8 documents6 sources
Severity
5.5MEDIUMNVD
EPSS
0.2%
top 64.22%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 23
Latest updateMay 13

Description

Quick Emulator (Qemu) built with the 'chardev' backend support is vulnerable to a use after free issue. It could occur while hotplug and unplugging the device in the guest. A guest user/process could use this flaw to crash a Qemu process on the host resulting in DoS.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

debiandebian/qemu< qemu 1:2.8+dfsg-1 (bookworm)
Debianqemu/qemu< 1:2.8+dfsg-1+3
NVDqemu/qemu2.7.1

Patches

🔴Vulnerability Details

2
GHSA
GHSA-chcq-mx34-rm7h: Quick Emulator (Qemu) built with the 'chardev' backend support is vulnerable to a use after free issue2022-05-13
OSV
CVE-2016-9923: Quick Emulator (Qemu) built with the 'chardev' backend support is vulnerable to a use after free issue2016-12-23

📋Vendor Advisories

2
Red Hat
Qemu: char: use-after-free issue during hotplug and unplugging device2016-11-24
Debian
CVE-2016-9923: qemu - Quick Emulator (Qemu) built with the 'chardev' backend support is vulnerable to ...2016

💬Community

3
Bugzilla
CVE-2016-9923 xen: Qemu: char: use-after-free issue during hotplug and unplugging device [fedora-all]2016-12-08
Bugzilla
CVE-2016-9923 Qemu: char: use-after-free issue during hotplug and unplugging device2016-12-08
Bugzilla
CVE-2016-9923 Qemu: char: use-after-free issue during hotplug and unplugging device [fedora-all]2016-12-08