Medium severity6.5NVD Advisory· Published Apr 7, 2016· Updated May 6, 2026
CVE-2016-2858
CVE-2016-2858
Description
QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process crash) via an entropy request, which triggers arbitrary stack based allocation and memory corruption.
Affected products
6cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*+ 3 more
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- bugzilla.redhat.com/show_bug.cginvdIssue TrackingPatchThird Party Advisory
- www.openwall.com/lists/oss-security/2016/03/04/1nvdMailing ListThird Party Advisory
- www.openwall.com/lists/oss-security/2016/03/07/4nvdMailing ListThird Party Advisory
- www.securityfocus.com/bid/84134nvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/USN-2974-1nvdThird Party Advisory
- lists.debian.org/debian-lts-announce/2018/11/msg00038.htmlnvdMailing ListThird Party Advisory
- security.gentoo.org/glsa/201604-01nvdThird Party Advisory
News mentions
0No linked articles in our index yet.