Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-4020

Опубликовано: 25 мая 2016
Источник: debian
EPSS Низкий

Описание

The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32 variable, which allows local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemufixed1:2.6+dfsg-2package
qemu-kvmremovedpackage

Примечания

  • https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01118.html

  • https://bugzilla.redhat.com/show_bug.cgi?id=1313686

  • https://www.openwall.com/lists/oss-security/2016/04/13/6

EPSS

Процентиль: 26%
0.00085
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 9 лет назад

The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32 variable, which allows local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR).

CVSS3: 3.4
redhat
около 9 лет назад

The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32 variable, which allows local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR).

CVSS3: 6.5
nvd
около 9 лет назад

The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32 variable, which allows local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR).

CVSS3: 6.5
github
около 3 лет назад

The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32 variable, which allows local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR).

oracle-oval
почти 8 лет назад

ELSA-2017-1856: qemu-kvm security, bug fix, and enhancement update (MODERATE)

EPSS

Процентиль: 26%
0.00085
Низкий
Уязвимость CVE-2016-4020