QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process crash) via an entropy request, which triggers arbitrary stack based allocation and memory corruption.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2016-04-07 19:59
Updated : 2025-04-12 10:46
NVD link : CVE-2016-2858
Mitre link : CVE-2016-2858
CVE.ORG link : CVE-2016-2858
JSON object : View
Products Affected
qemu
- qemu
debian
- debian_linux
canonical
- ubuntu_linux
CWE
CWE-331
Insufficient Entropy