CVE Vulnerabilities

CVE-2016-4020

Published: May 25, 2016 | Modified: Apr 12, 2025
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
CVSS 2.x
2.1 LOW
AV:L/AC:L/Au:N/C:P/I:N/A:N
RedHat/V2
2.9 LOW
AV:A/AC:M/Au:N/C:P/I:N/A:N
RedHat/V3
3.4 LOW
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32 variable, which allows local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR).

Affected Software

NameVendorStart VersionEnd Version
QemuQemu*2.6.2 (including)
Red Hat Enterprise Linux 7RedHatqemu-kvm-10:1.5.3-141.el7*
Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7RedHatqemu-kvm-rhev-10:2.9.0-10.el7*
Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7RedHatqemu-kvm-rhev-10:2.9.0-10.el7*
Red Hat OpenStack Platform 10.0 (Newton)RedHatqemu-kvm-rhev-10:2.9.0-10.el7*
Red Hat OpenStack Platform 11.0 (Ocata)RedHatqemu-kvm-rhev-10:2.9.0-10.el7*
Red Hat OpenStack Platform 8.0 (Liberty)RedHatqemu-kvm-rhev-10:2.9.0-10.el7*
Red Hat OpenStack Platform 9.0 (Mitaka)RedHatqemu-kvm-rhev-10:2.9.0-10.el7*
Red Hat Virtualization 4 for Red Hat Enterprise Linux 7RedHatqemu-kvm-rhev-10:2.9.0-14.el7*
QemuUbuntuesm-infra-legacy/trusty*
QemuUbuntuesm-infra/xenial*
QemuUbuntutrusty*
QemuUbuntutrusty/esm*
QemuUbuntuupstream*
QemuUbuntuwily*
QemuUbuntuxenial*

References