QEMU, when built with the Pseudo Random Number Generator ...
Moderate severity
Unreviewed
Published
May 13, 2022
to the GitHub Advisory Database
•
Updated Feb 13, 2023
Description
Published by the National Vulnerability Database
Apr 7, 2016
Published to the GitHub Advisory Database
May 13, 2022
Last updated
Feb 13, 2023
QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process crash) via an entropy request, which triggers arbitrary stack based allocation and memory corruption.
References