First published: Sat Dec 10 2016(Updated: )
The vmxnet3_complete_packet function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to obtain sensitive host memory information by leveraging failure to initialize the txcq_descr object.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=2.7.1 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6836 is rated as a medium severity vulnerability due to its potential impact on host memory information exposure.
To fix CVE-2016-6836, upgrade QEMU to version 2.7.2 or later.
CVE-2016-6836 affects local guest OS administrators using vulnerable versions of QEMU and Debian Linux 8.0.
CVE-2016-6836 allows local guest OS administrators to leak sensitive host memory information.
CVE-2016-6836 was disclosed in August 2016, highlighting a significant security weakness in QEMU.