Описание
QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process crash) via an entropy request, which triggers arbitrary stack based allocation and memory corruption.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 1:2.6+dfsg-3ubuntu1 |
| esm-infra-legacy/trusty | released | 2.0.0+dfsg-2ubuntu1.24 |
| esm-infra/xenial | released | 1:2.5+dfsg-5ubuntu10.1 |
| precise | DNE | |
| trusty | released | 2.0.0+dfsg-2ubuntu1.24 |
| trusty/esm | released | 2.0.0+dfsg-2ubuntu1.24 |
| upstream | needs-triage | |
| vivid/stable-phone-overlay | DNE | |
| vivid/ubuntu-core | DNE | |
| wily | released | 1:2.3+dfsg-5ubuntu9.4 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | |
| precise | not-affected | code not present |
| trusty | DNE | |
| trusty/esm | DNE | |
| upstream | needs-triage | |
| vivid/stable-phone-overlay | DNE | |
| vivid/ubuntu-core | DNE | |
| wily | DNE | |
| xenial | DNE |
Показывать по
EPSS
1.9 Low
CVSS2
6.5 Medium
CVSS3
Связанные уязвимости
QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process crash) via an entropy request, which triggers arbitrary stack based allocation and memory corruption.
QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process crash) via an entropy request, which triggers arbitrary stack based allocation and memory corruption.
QEMU, when built with the Pseudo Random Number Generator (PRNG) back-e ...
QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process crash) via an entropy request, which triggers arbitrary stack based allocation and memory corruption.
EPSS
1.9 Low
CVSS2
6.5 Medium
CVSS3