vulnerability

Oracle Linux: CVE-2016-4020: ELSA-2017-1856: qemu-kvm security, bug fix, and enhancement update (MODERATE)

Severity
2
CVSS
(AV:A/AC:H/Au:N/C:P/I:N/A:N)
Published
2016-04-07
Added
2017-08-08
Modified
2025-01-07

Description

The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32 variable, which allows local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR).
An information-exposure flaw was found in Quick Emulator (QEMU) in Task Priority Register (TPR) optimizations for 32-bit Windows guests. The flaw could occur while accessing TPR. A privileged user inside a guest could use this issue to read portions of the host memory.

Solution(s)

oracle-linux-upgrade-qemu-imgoracle-linux-upgrade-qemu-kvmoracle-linux-upgrade-qemu-kvm-commonoracle-linux-upgrade-qemu-kvm-tools
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.