Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-4020

Опубликовано: 25 мая 2016
Источник: debian

Описание

The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32 variable, which allows local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemufixed1:2.6+dfsg-2package
qemu-kvmremovedpackage

Примечания

  • https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01118.html

  • https://bugzilla.redhat.com/show_bug.cgi?id=1313686

  • https://www.openwall.com/lists/oss-security/2016/04/13/6

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 9 лет назад

The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32 variable, which allows local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR).

CVSS3: 3.4
redhat
больше 9 лет назад

The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32 variable, which allows local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR).

CVSS3: 6.5
nvd
около 9 лет назад

The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32 variable, which allows local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR).

CVSS3: 6.5
github
около 3 лет назад

The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32 variable, which allows local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR).

oracle-oval
около 8 лет назад

ELSA-2017-1856: qemu-kvm security, bug fix, and enhancement update (MODERATE)