First published: Fri Mar 04 2016(Updated: )
Qemu emulator built with the Pseudo Random Number Generator(PRNG) back-end support is vulnerable to an arbitrary stack based allocation and memory corruption via random bytes issue. It could occur when a guest requests for entropy for random number generation. A user/process inside guest could use this flaw to crash the Qemu process resulting in DoS. Upstream patch: --------------- -> <a href="http://git.qemu.org/?p=qemu.git;a=commit;h=60253ed1e6ec6d8e5ef2efe7bf755f475">http://git.qemu.org/?p=qemu.git;a=commit;h=60253ed1e6ec6d8e5ef2efe7bf755f475</a> Reference: ---------- -> <a href="http://www.openwall.com/lists/oss-security/2016/03/04/1">http://www.openwall.com/lists/oss-security/2016/03/04/1</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | <=2.5.1.1 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =15.10 | |
Canonical Ubuntu Linux | =16.04 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.