CVE-2016-2858 — Insufficient Entropy in Qemu
Severity
6.5MEDIUMNVD
OSV5.0
EPSS
0.1%
top 68.39%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 7
Latest updateMay 13
Description
QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process crash) via an entropy request, which triggers arbitrary stack based allocation and memory corruption.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:HExploitability: 2.0 | Impact: 4.0
Affected Packages4 packages
Also affects: Debian Linux 8.0, Ubuntu Linux 12.04, 14.04, 15.10, 16.04
Patches
🔴Vulnerability Details
3GHSA▶
GHSA-m22w-qpwr-jxrj: QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process cr↗2022-05-13
OSV▶
CVE-2016-2858: QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process cr↗2016-04-07
📋Vendor Advisories
3💬Community
1Bugzilla
▶