CVE-2016-1714

The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c in QEMU before 2.4, when built with the Firmware Configuration device emulation support, allow guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access and process crash) or possibly execute arbitrary code via an invalid current entry value in a firmware configuration.
References
Link Resource
http://rhn.redhat.com/errata/RHSA-2016-0081.html
http://rhn.redhat.com/errata/RHSA-2016-0082.html
http://rhn.redhat.com/errata/RHSA-2016-0083.html
http://rhn.redhat.com/errata/RHSA-2016-0084.html
http://rhn.redhat.com/errata/RHSA-2016-0085.html Issue Tracking Third Party Advisory VDB Entry
http://rhn.redhat.com/errata/RHSA-2016-0086.html
http://rhn.redhat.com/errata/RHSA-2016-0087.html
http://rhn.redhat.com/errata/RHSA-2016-0088.html Issue Tracking Third Party Advisory VDB Entry
http://www.debian.org/security/2016/dsa-3469
http://www.debian.org/security/2016/dsa-3470
http://www.debian.org/security/2016/dsa-3471
http://www.openwall.com/lists/oss-security/2016/01/11/7 Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/01/12/10 Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/01/12/11 Third Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html Third Party Advisory
http://www.securityfocus.com/bid/80250 Third Party Advisory
http://www.securitytracker.com/id/1034858 Third Party Advisory
https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg00428.html Vendor Advisory
https://security.gentoo.org/glsa/201604-01
http://rhn.redhat.com/errata/RHSA-2016-0081.html
http://rhn.redhat.com/errata/RHSA-2016-0082.html
http://rhn.redhat.com/errata/RHSA-2016-0083.html
http://rhn.redhat.com/errata/RHSA-2016-0084.html
http://rhn.redhat.com/errata/RHSA-2016-0085.html Issue Tracking Third Party Advisory VDB Entry
http://rhn.redhat.com/errata/RHSA-2016-0086.html
http://rhn.redhat.com/errata/RHSA-2016-0087.html
http://rhn.redhat.com/errata/RHSA-2016-0088.html Issue Tracking Third Party Advisory VDB Entry
http://www.debian.org/security/2016/dsa-3469
http://www.debian.org/security/2016/dsa-3470
http://www.debian.org/security/2016/dsa-3471
http://www.openwall.com/lists/oss-security/2016/01/11/7 Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/01/12/10 Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/01/12/11 Third Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html Third Party Advisory
http://www.securityfocus.com/bid/80250 Third Party Advisory
http://www.securitytracker.com/id/1034858 Third Party Advisory
https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg00428.html Vendor Advisory
https://security.gentoo.org/glsa/201604-01
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:46

Type Values Removed Values Added
References () http://rhn.redhat.com/errata/RHSA-2016-0081.html - () http://rhn.redhat.com/errata/RHSA-2016-0081.html -
References () http://rhn.redhat.com/errata/RHSA-2016-0082.html - () http://rhn.redhat.com/errata/RHSA-2016-0082.html -
References () http://rhn.redhat.com/errata/RHSA-2016-0083.html - () http://rhn.redhat.com/errata/RHSA-2016-0083.html -
References () http://rhn.redhat.com/errata/RHSA-2016-0084.html - () http://rhn.redhat.com/errata/RHSA-2016-0084.html -
References () http://rhn.redhat.com/errata/RHSA-2016-0085.html - Issue Tracking, Third Party Advisory, VDB Entry () http://rhn.redhat.com/errata/RHSA-2016-0085.html - Issue Tracking, Third Party Advisory, VDB Entry
References () http://rhn.redhat.com/errata/RHSA-2016-0086.html - () http://rhn.redhat.com/errata/RHSA-2016-0086.html -
References () http://rhn.redhat.com/errata/RHSA-2016-0087.html - () http://rhn.redhat.com/errata/RHSA-2016-0087.html -
References () http://rhn.redhat.com/errata/RHSA-2016-0088.html - Issue Tracking, Third Party Advisory, VDB Entry () http://rhn.redhat.com/errata/RHSA-2016-0088.html - Issue Tracking, Third Party Advisory, VDB Entry
References () http://www.debian.org/security/2016/dsa-3469 - () http://www.debian.org/security/2016/dsa-3469 -
References () http://www.debian.org/security/2016/dsa-3470 - () http://www.debian.org/security/2016/dsa-3470 -
References () http://www.debian.org/security/2016/dsa-3471 - () http://www.debian.org/security/2016/dsa-3471 -
References () http://www.openwall.com/lists/oss-security/2016/01/11/7 - Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/01/11/7 - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2016/01/12/10 - Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/01/12/10 - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2016/01/12/11 - Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/01/12/11 - Third Party Advisory
References () http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html - Third Party Advisory () http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html - Third Party Advisory
References () http://www.securityfocus.com/bid/80250 - Third Party Advisory () http://www.securityfocus.com/bid/80250 - Third Party Advisory
References () http://www.securitytracker.com/id/1034858 - Third Party Advisory () http://www.securitytracker.com/id/1034858 - Third Party Advisory
References () https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg00428.html - Vendor Advisory () https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg00428.html - Vendor Advisory
References () https://security.gentoo.org/glsa/201604-01 - () https://security.gentoo.org/glsa/201604-01 -

Information

Published : 2016-04-07 19:59

Updated : 2024-11-21 02:46


NVD link : CVE-2016-1714

Mitre link : CVE-2016-1714

CVE.ORG link : CVE-2016-1714


JSON object : View

Products Affected

oracle

  • linux

redhat

  • openstack

qemu

  • qemu
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer