Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-2858

Опубликовано: 07 апр. 2016
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 1.9
CVSS3: 6.5

Описание

QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process crash) via an entropy request, which triggers arbitrary stack based allocation and memory corruption.

РелизСтатусПримечание
devel

not-affected

1:2.6+dfsg-3ubuntu1
esm-infra-legacy/trusty

released

2.0.0+dfsg-2ubuntu1.24
esm-infra/xenial

released

1:2.5+dfsg-5ubuntu10.1
precise

DNE

trusty

released

2.0.0+dfsg-2ubuntu1.24
trusty/esm

released

2.0.0+dfsg-2ubuntu1.24
upstream

needs-triage

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

released

1:2.3+dfsg-5ubuntu9.4

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

not-affected

code not present
trusty

DNE

trusty/esm

DNE

upstream

needs-triage

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

DNE

xenial

DNE

Показывать по

EPSS

Процентиль: 32%
0.00124
Низкий

1.9 Low

CVSS2

6.5 Medium

CVSS3

Связанные уязвимости

redhat
около 10 лет назад

QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process crash) via an entropy request, which triggers arbitrary stack based allocation and memory corruption.

CVSS3: 6.5
nvd
почти 10 лет назад

QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process crash) via an entropy request, which triggers arbitrary stack based allocation and memory corruption.

CVSS3: 6.5
debian
почти 10 лет назад

QEMU, when built with the Pseudo Random Number Generator (PRNG) back-e ...

CVSS3: 6.5
github
больше 3 лет назад

QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process crash) via an entropy request, which triggers arbitrary stack based allocation and memory corruption.

suse-cvrf
больше 9 лет назад

Security update for qemu

EPSS

Процентиль: 32%
0.00124
Низкий

1.9 Low

CVSS2

6.5 Medium

CVSS3