QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process crash) via an entropy request, which triggers arbitrary stack based allocation and memory corruption.
The product uses an algorithm or scheme that produces insufficient entropy, leaving patterns or clusters of values that are more likely to occur than others.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2016/03/07/4 | third party advisory mailing list |
https://bugzilla.redhat.com/show_bug.cgi?id=1314676 | issue tracking third party advisory patch |
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=60253ed1e6ec6d8e5ef2efe7bf755f475dce9956 | |
https://security.gentoo.org/glsa/201604-01 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/84134 | vdb entry third party advisory |
http://www.ubuntu.com/usn/USN-2974-1 | third party advisory vendor advisory |
http://www.openwall.com/lists/oss-security/2016/03/04/1 | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html | third party advisory mailing list |