Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-2858

Опубликовано: 22 янв. 2016
Источник: redhat
CVSS2: 4.3
EPSS Низкий

Описание

QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process crash) via an entropy request, which triggers arbitrary stack based allocation and memory corruption.

Отчет

This has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kvmNot affected
Red Hat Enterprise Linux 5xenNot affected
Red Hat Enterprise Linux 6qemu-kvmWill not fix
Red Hat Enterprise Linux 7qemu-kvmWill not fix
Red Hat Enterprise Linux 7qemu-kvm-rhevWill not fix
Red Hat Enterprise Linux OpenStack Platform 5 (Icehouse)qemu-kvm-rhevWill not fix
Red Hat Enterprise Linux OpenStack Platform 6 (Juno)qemu-kvm-rhevWill not fix
Red Hat Enterprise Linux OpenStack Platform 7 (Kilo)qemu-kvm-rhevWill not fix
Red Hat OpenStack Platform 8 (Liberty)qemu-kvm-rhevWill not fix

Показывать по

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=1314676Qemu: rng-random: arbitrary stack based allocation leading to corruption

EPSS

Процентиль: 32%
0.00124
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

CVSS3: 6.5
ubuntu
почти 10 лет назад

QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process crash) via an entropy request, which triggers arbitrary stack based allocation and memory corruption.

CVSS3: 6.5
nvd
почти 10 лет назад

QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process crash) via an entropy request, which triggers arbitrary stack based allocation and memory corruption.

CVSS3: 6.5
debian
почти 10 лет назад

QEMU, when built with the Pseudo Random Number Generator (PRNG) back-e ...

CVSS3: 6.5
github
больше 3 лет назад

QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process crash) via an entropy request, which triggers arbitrary stack based allocation and memory corruption.

suse-cvrf
больше 9 лет назад

Security update for qemu

EPSS

Процентиль: 32%
0.00124
Низкий

4.3 Medium

CVSS2