First published: Wed Mar 02 2016(Updated: )
The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32 variable, which allows local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR).
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=2.6.2 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.10 | |
Ubuntu | =16.04 | |
Debian | =8.0 | |
redhat openstack | =6.0 | |
redhat openstack | =7.0 | |
redhat openstack | =8 | |
redhat openstack | =9 | |
redhat openstack | =10 | |
redhat openstack | =11 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux eus | =7.4 | |
redhat enterprise Linux eus | =7.5 | |
redhat enterprise Linux eus | =7.6 | |
redhat enterprise Linux eus | =7.7 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.4 | |
redhat enterprise Linux server aus | =7.6 | |
redhat enterprise Linux server aus | =7.7 | |
redhat enterprise Linux server tus | =7.6 | |
redhat enterprise Linux server tus | =7.7 | |
redhat enterprise Linux workstation | =7.0 | |
Red Hat Enterprise Virtualization | =4.0 | |
Red Hat Enterprise Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4020 has a moderate severity rating, as it allows local guest OS administrators to access sensitive information from the host's memory.
To mitigate CVE-2016-4020, update QEMU to the latest version or apply the patched versions indicated by your distribution.
No, CVE-2016-4020 is not remotely exploitable as the attack requires local access to the guest OS.
CVE-2016-4020 affects various versions of QEMU up to and including 2.6.2 and specific versions of Ubuntu and Red Hat OpenStack.
Systems running vulnerable versions of QEMU, Ubuntu 12.04, 14.04, 15.10, 16.04, and various Red Hat OpenStack versions are susceptible to CVE-2016-4020.