CVE-2016-2858 PUBLISHED

QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process crash) via an entropy request, which triggers arbitrary stack based allocation and memory corruption.

EPSS 0.12% · 31.6th percentile

Risk Scores

EPSS Score
0.12%
31.6th percentile

Affected Products

VendorProductVersions
Ubuntu:14.04:LTSqemu0, 1.5.0+dfsg-3ubuntu5, 1.5.0+dfsg-3ubuntu6
Ubuntu:16.04:LTSqemu0, 1:2.3+dfsg-5ubuntu9, 1:2.3+dfsg-5ubuntu10

Timeline

References

Open in Interactive Console →