First published: Thu Apr 28 2016(Updated: )
The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the "Dark Portal" issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Debian | =8.0 | |
HP Helion OpenStack | =2.0.0 | |
HP Helion OpenStack | =2.1.0 | |
HP Helion OpenStack | =2.1.2 | |
HP Helion OpenStack | =2.1.4 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.10 | |
Ubuntu | =16.04 | |
QEMU | <=2.5.1 | |
QEMU | =2.6.0-rc0 | |
QEMU | =2.6.0-rc1 | |
QEMU | =2.6.0-rc2 | |
QEMU | =2.6.0-rc3 | |
QEMU | =2.6.0-rc4 | |
Oracle VM Server | =3.2 | |
Oracle VM Server | =3.3 | |
Oracle VM Server | =3.4 | |
Oracle Linux | =5 | |
Oracle Linux | =6 | |
Oracle Linux | =7 | |
XenServer | <=7.0 | |
Red Hat OpenStack for IBM Power | =5.0 | |
Red Hat OpenStack for IBM Power | =6.0 | |
Red Hat OpenStack for IBM Power | =7.0 | |
Red Hat OpenStack for IBM Power | =8 | |
Red Hat Enterprise Virtualization | =3.0 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.2 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.2 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.5 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.7 | |
Red Hat Enterprise Linux Server | =7.2 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.7 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Red Hat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3710 has been classified with a moderate severity rating due to its potential to allow arbitrary code execution on the host system.
To remediate CVE-2016-3710, update QEMU to the latest version that addresses this vulnerability.
CVE-2016-3710 affects several software platforms including QEMU versions up to 2.6.0-rc4 and various distributions like Debian 8.0, Ubuntu 12.04, and HP Helion OpenStack.
No, CVE-2016-3710 requires local access to the vulnerable guest operating system to exploit the vulnerability.
CVE-2016-3710 allows local guest OS administrators to execute arbitrary code on the host, which compromises isolation between the host and guest environments.