CVE-2016-2858Insufficient Entropy in Qemu

Severity
6.5MEDIUMNVD
OSV5.0
EPSS
0.1%
top 68.39%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 7
Latest updateMay 13

Description

QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process crash) via an entropy request, which triggers arbitrary stack based allocation and memory corruption.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:HExploitability: 2.0 | Impact: 4.0

Affected Packages4 packages

debiandebian/qemu< qemu 1:2.6+dfsg-1 (bookworm)
Debianqemu/qemu< 1:2.6+dfsg-1+3
Ubuntuqemu/qemu< 2.0.0+dfsg-2ubuntu1.24+1
NVDqemu/qemu2.5.1.1

Also affects: Debian Linux 8.0, Ubuntu Linux 12.04, 14.04, 15.10, 16.04

Patches

🔴Vulnerability Details

3
GHSA
GHSA-m22w-qpwr-jxrj: QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process cr2022-05-13
OSV
qemu, qemu-kvm vulnerabilities2016-05-12
OSV
CVE-2016-2858: QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process cr2016-04-07

📋Vendor Advisories

3
Ubuntu
QEMU vulnerabilities2016-05-12
Red Hat
Qemu: rng-random: arbitrary stack based allocation leading to corruption2016-01-22
Debian
CVE-2016-2858: qemu - QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support...2016

💬Community

1
Bugzilla
CVE-2016-2858 Qemu: rng-random: arbitrary stack based allocation leading to corruption2016-03-04