CVE-2016-6836Improper Initialization in Qemu

Severity
6.0MEDIUMNVD
OSV5.5
EPSS
0.1%
top 77.53%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 10
Latest updateMay 13

Description

The vmxnet3_complete_packet function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to obtain sensitive host memory information by leveraging failure to initialize the txcq_descr object.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:NExploitability: 1.5 | Impact: 4.0

Affected Packages4 packages

debiandebian/qemu< qemu 1:2.6+dfsg-3.1 (bookworm)
Debianqemu/qemu< 1:2.6+dfsg-3.1+3
Ubuntuqemu/qemu< 2.0.0+dfsg-2ubuntu1.30+1
NVDqemu/qemu2.7.1

Also affects: Debian Linux 8.0

Patches

🔴Vulnerability Details

3
GHSA
GHSA-rpvr-65rv-4fvq: The vmxnet3_complete_packet function in hw/net/vmxnet32022-05-13
OSV
CVE-2016-6836: The vmxnet3_complete_packet function in hw/net/vmxnet32016-12-10
OSV
qemu, qemu-kvm vulnerabilities2016-11-09

📋Vendor Advisories

3
Ubuntu
QEMU vulnerabilities2016-11-09
Red Hat
Qemu: net: vmxnet: Information leakage in vmxnet3_complete_packet2016-08-11
Debian
CVE-2016-6836: qemu - The vmxnet3_complete_packet function in hw/net/vmxnet3.c in QEMU (aka Quick Emul...2016

💬Community

1
Bugzilla
CVE-2016-6836 Qemu: net: vmxnet: Information leakage in vmxnet3_complete_packet2016-08-11