First published: Mon May 16 2016(Updated: )
Quick Emulator(Qemu) built with the VMware-SVGA "chipset" emulation support is vulnerable to an information disclosure issue. It could occur while processing VGA commands via its FIFO buffer. A privileged user inside guest could use this flaw to leak host memory bytes or crash the Qemu process resulting in DoS. Upstream fix: ------------- -> <a href="https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg05271.html">https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg05271.html</a> Reference: ---------- -> <a href="http://www.openwall.com/lists/oss-security/2016/05/30/3">http://www.openwall.com/lists/oss-security/2016/05/30/3</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU | <=2.6.0 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Debian | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-4454 is classified as a medium risk due to the potential for information disclosure and system crashes.
To fix CVE-2016-4454, upgrade QEMU to a version later than 2.6.0 that addresses this vulnerability.
CVE-2016-4454 affects users running QEMU versions up to 2.6.0, particularly on Linux distributions such as Ubuntu and Debian.
CVE-2016-4454 is caused by an information disclosure flaw in the VMware-SVGA chipset emulation when processing VGA commands.
CVE-2016-4454 requires a privileged user inside the guest to exploit, meaning remote exploitation is not possible.