First published: Fri Mar 04 2016(Updated: )
Qemu emulator built with the Pseudo Random Number Generator(PRNG) back-end support is vulnerable to an arbitrary stack based allocation and memory corruption via random bytes issue. It could occur when a guest requests for entropy for random number generation. A user/process inside guest could use this flaw to crash the Qemu process resulting in DoS. Upstream patch: --------------- -> <a href="http://git.qemu.org/?p=qemu.git;a=commit;h=60253ed1e6ec6d8e5ef2efe7bf755f475">http://git.qemu.org/?p=qemu.git;a=commit;h=60253ed1e6ec6d8e5ef2efe7bf755f475</a> Reference: ---------- -> <a href="http://www.openwall.com/lists/oss-security/2016/03/04/1">http://www.openwall.com/lists/oss-security/2016/03/04/1</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=2.5.1.1 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.10 | |
Ubuntu | =16.04 | |
Debian | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2858 is considered a medium severity vulnerability due to its potential for memory corruption.
To fix CVE-2016-2858, users should upgrade to a version of QEMU later than 2.5.1.1 that resolves this vulnerability.
CVE-2016-2858 can lead to arbitrary stack-based memory corruption, potentially allowing an attacker to execute arbitrary code.
CVE-2016-2858 affects QEMU versions up to and including 2.5.1.1, as well as specific versions of Ubuntu and Debian Linux.
An attacker with access to a guest environment can exploit CVE-2016-2858 by requesting entropy for random number generation.