CVE Vulnerabilities

CVE-2016-2858

Insufficient Entropy

Published: Apr 07, 2016 | Modified: Feb 12, 2023
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
CVSS 2.x
1.9 LOW
AV:L/AC:M/Au:N/C:N/I:N/A:P
RedHat/V2
4.3 LOW
AV:A/AC:M/Au:N/C:N/I:P/A:P
RedHat/V3
Ubuntu
LOW

QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process crash) via an entropy request, which triggers arbitrary stack based allocation and memory corruption.

Weakness

The product uses an algorithm or scheme that produces insufficient entropy, leaving patterns or clusters of values that are more likely to occur than others.

Affected Software

Name Vendor Start Version End Version
Qemu Qemu * 2.5.1.1 (including)
Qemu Ubuntu trusty *
Qemu Ubuntu wily *
Qemu Ubuntu xenial *

Potential Mitigations

References