The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the "Dark Portal" issue.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
History
21 Nov 2024, 02:50
Type | Values Removed | Values Added |
---|---|---|
References | () http://rhn.redhat.com/errata/RHSA-2016-0724.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2016-0725.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2016-0997.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2016-0999.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2016-1000.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2016-1001.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2016-1002.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2016-1019.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2016-1943.html - Third Party Advisory | |
References | () http://support.citrix.com/article/CTX212736 - Third Party Advisory | |
References | () http://www.debian.org/security/2016/dsa-3573 - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2016/05/09/3 - Mailing List, Third Party Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html - Third Party Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html - Third Party Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/90316 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1035794 - Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-2974-1 - Third Party Advisory | |
References | () http://xenbits.xen.org/xsa/advisory-179.html - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2016:1224 - Third Party Advisory | |
References | () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862 - Third Party Advisory, Vendor Advisory | |
References | () https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg01197.html - Mailing List, Patch, Third Party Advisory |
Information
Published : 2016-05-11 21:59
Updated : 2025-04-12 10:46
NVD link : CVE-2016-3710
Mitre link : CVE-2016-3710
CVE.ORG link : CVE-2016-3710
JSON object : View
Products Affected
debian
- debian_linux
redhat
- virtualization
- openstack
- enterprise_linux_server_tus
- enterprise_linux_workstation
- enterprise_linux_server_eus
- enterprise_linux_server
- enterprise_linux_desktop
- enterprise_linux_server_aus
qemu
- qemu
citrix
- xenserver
hp
- helion_openstack
canonical
- ubuntu_linux
oracle
- vm_server
- linux
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer