The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the "Dark Portal" issue.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
History
21 Nov 2024, 02:50
Type | Values Removed | Values Added |
---|---|---|
References | () http://rhn.redhat.com/errata/RHSA-2016-0724.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2016-0725.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2016-0997.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2016-0999.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2016-1000.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2016-1001.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2016-1002.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2016-1019.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2016-1943.html - Third Party Advisory | |
References | () http://support.citrix.com/article/CTX212736 - Third Party Advisory | |
References | () http://www.debian.org/security/2016/dsa-3573 - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2016/05/09/3 - Mailing List, Third Party Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html - Third Party Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html - Third Party Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/90316 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1035794 - Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-2974-1 - Third Party Advisory | |
References | () http://xenbits.xen.org/xsa/advisory-179.html - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2016:1224 - Third Party Advisory | |
References | () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862 - Third Party Advisory, Vendor Advisory | |
References | () https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg01197.html - Mailing List, Patch, Third Party Advisory |
Information
Published : 2016-05-11 21:59
Updated : 2024-11-21 02:50
NVD link : CVE-2016-3710
Mitre link : CVE-2016-3710
CVE.ORG link : CVE-2016-3710
JSON object : View
Products Affected
oracle
- vm_server
- linux
redhat
- enterprise_linux_server
- openstack
- virtualization
- enterprise_linux_desktop
- enterprise_linux_server_eus
- enterprise_linux_server_aus
- enterprise_linux_server_tus
- enterprise_linux_workstation
canonical
- ubuntu_linux
hp
- helion_openstack
qemu
- qemu
debian
- debian_linux
citrix
- xenserver
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer