Back to bug 1318712
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Adam Mariš | 2016-03-17 15:00:16 UTC | CC | security-response-team | |
| Red Hat Bugzilla | 2016-03-17 15:00:16 UTC | Doc Type | --- | Bug Fix |
| Adam Mariš | 2016-03-17 15:43:54 UTC | Blocks | 1318730 | |
| John Skeoch | 2016-04-18 07:33:30 UTC | CC | yeylon | srevivo |
| Perry Myers | 2016-04-19 00:54:57 UTC | CC | pmyers | |
| Prasad Pandit | 2016-05-02 18:58:27 UTC | Alias | CVE-2016-3712 | |
| Prasad Pandit | 2016-05-02 18:58:35 UTC | Summary | EMBARGOED qemu-kvm: Out-of-bounds read when creating weird vga screen surface | EMBARGOED CVE-2016-3712 qemu-kvm: Out-of-bounds read when creating weird vga screen surface |
| Prasad Pandit | 2016-05-02 19:13:06 UTC | CC | prasad | |
| Doc Text | Qemu emulator built with the VGA Emulator support is vulnerable to an integer overflow and OOB read access issues. This occurs because Qemu allows certain VGA registers to be set while in VBE mode. A privileged guest user could use this flaw to crash the Qemu process instance resulting in DoS. | |||
| Whiteboard | impact=moderate,public=no,reported=20160317,source=researcher,cvss2=5.2/AV:A/AC:M/Au:S/C:N/I:N/A:C,cwe=CWE-125,rhel-5/kvm=new,rhel-5/xen=new,rhel-6/qemu-kvm=new,rhel-6/qemu-kvm-rhev=new,rhel-7/qemu-kvm=new,rhel-7/qemu-kvm-rhev=new,openstack-5/qemu-kvm-rhev=new,openstack-6/qemu-kvm-rhev=new,openstack-7/qemu-kvm-rhev=new,openstack-8/qemu-kvm-rhev=new,rhev-m-3/qemu-kvm-rhev=new,fedora-all/qemu=affected,fedora-all/xen=affected | impact=moderate,public=no,reported=20160317,source=researcher,cvss2=3.8/AV:A/AC:M/Au:S/C:P/I:N/A:P,cwe=CWE-125,rhel-5/kvm=affected,rhel-5/xen=affected,rhel-6/qemu-kvm=affected,rhel-6/qemu-kvm-rhev=affected,rhel-7/qemu-kvm=affected,rhel-7/qemu-kvm-rhev=affected,openstack-5/qemu-kvm-rhev=affected,openstack-6/qemu-kvm-rhev=affected,openstack-7/qemu-kvm-rhev=affected,openstack-8/qemu-kvm-rhev=affected,fedora-all/qemu=affected,fedora-all/xen=affected | ||
| Prasad Pandit | 2016-05-02 19:15:48 UTC | Depends On | 1332282 | |
| Prasad Pandit | 2016-05-02 19:15:59 UTC | Depends On | 1332284 | |
| Prasad Pandit | 2016-05-02 19:19:55 UTC | Whiteboard | impact=moderate,public=no,reported=20160317,source=researcher,cvss2=3.8/AV:A/AC:M/Au:S/C:P/I:N/A:P,cwe=CWE-125,rhel-5/kvm=affected,rhel-5/xen=affected,rhel-6/qemu-kvm=affected,rhel-6/qemu-kvm-rhev=affected,rhel-7/qemu-kvm=affected,rhel-7/qemu-kvm-rhev=affected,openstack-5/qemu-kvm-rhev=affected,openstack-6/qemu-kvm-rhev=affected,openstack-7/qemu-kvm-rhev=affected,openstack-8/qemu-kvm-rhev=affected,fedora-all/qemu=affected,fedora-all/xen=affected | impact=moderate,public=no,reported=20160317,source=researcher,cvss2=3.8/AV:A/AC:M/Au:S/C:P/I:N/A:P,cwe=CWE-125,rhel-5/kvm=wontfix,rhel-5/xen=wontfix,rhel-6/qemu-kvm=affected,rhel-6/qemu-kvm-rhev=wontfix,rhel-7/qemu-kvm=affected,rhel-7/qemu-kvm-rhev=affected,openstack-5/qemu-kvm-rhev=wontfix,openstack-6/qemu-kvm-rhev=wontfix,openstack-7/qemu-kvm-rhev=wontfix,openstack-8/qemu-kvm-rhev=wontfix,fedora-all/qemu=affected,fedora-all/xen=affected |
| Adam Mariš | 2016-05-09 12:16:00 UTC | Whiteboard | impact=moderate,public=no,reported=20160317,source=researcher,cvss2=3.8/AV:A/AC:M/Au:S/C:P/I:N/A:P,cwe=CWE-125,rhel-5/kvm=wontfix,rhel-5/xen=wontfix,rhel-6/qemu-kvm=affected,rhel-6/qemu-kvm-rhev=wontfix,rhel-7/qemu-kvm=affected,rhel-7/qemu-kvm-rhev=affected,openstack-5/qemu-kvm-rhev=wontfix,openstack-6/qemu-kvm-rhev=wontfix,openstack-7/qemu-kvm-rhev=wontfix,openstack-8/qemu-kvm-rhev=wontfix,fedora-all/qemu=affected,fedora-all/xen=affected | impact=moderate,public=20160509,reported=20160317,source=researcher,cvss2=3.8/AV:A/AC:M/Au:S/C:P/I:N/A:P,cwe=CWE-125,rhel-5/kvm=wontfix,rhel-5/xen=wontfix,rhel-6/qemu-kvm=affected,rhel-6/qemu-kvm-rhev=wontfix,rhel-7/qemu-kvm=affected,rhel-7/qemu-kvm-rhev=affected,openstack-5/qemu-kvm-rhev=wontfix,openstack-6/qemu-kvm-rhev=wontfix,openstack-7/qemu-kvm-rhev=wontfix,openstack-8/qemu-kvm-rhev=wontfix,fedora-all/qemu=affected,fedora-all/xen=affected |
| Adam Mariš | 2016-05-09 12:16:39 UTC | Summary | EMBARGOED CVE-2016-3712 qemu-kvm: Out-of-bounds read when creating weird vga screen surface | CVE-2016-3712 qemu-kvm: Out-of-bounds read when creating weird vga screen surface |
| Adam Mariš | 2016-05-09 12:16:48 UTC | Group | security, qe_staff | |
| Prasad Pandit | 2016-05-09 12:20:44 UTC | Depends On | 1334342 | |
| Prasad Pandit | 2016-05-09 12:21:04 UTC | Depends On | 1334343 | |
| Eyal Edri | 2016-05-22 08:12:42 UTC | CC | eedri | |
| Gerd Hoffmann | 2016-05-24 14:16:54 UTC | CC | kraxel | |
| Jeff Nelson | 2016-05-24 16:59:02 UTC | Flags | needinfo?(areis) | |
| Ademar Reis | 2016-05-25 15:17:32 UTC | Flags | needinfo?(areis) | |
| Yoshinori Takahashi | 2016-05-30 00:57:02 UTC | CC | hkim | |
| Tomas Hoger | 2016-10-27 21:54:33 UTC | Doc Text | Qemu emulator built with the VGA Emulator support is vulnerable to an integer overflow and OOB read access issues. This occurs because Qemu allows certain VGA registers to be set while in VBE mode. A privileged guest user could use this flaw to crash the Qemu process instance resulting in DoS. | Qemu emulator built with the VGA Emulator support was vulnerable to an integer overflow and out of bounds read flaws, which occurred because Qemu allowed certain VGA registers to be set while in VBE mode. A privileged guest user could use this flaw to crash the Qemu process instance. |
| Martin Prpič | 2016-10-31 13:44:13 UTC | Doc Text | Qemu emulator built with the VGA Emulator support was vulnerable to an integer overflow and out of bounds read flaws, which occurred because Qemu allowed certain VGA registers to be set while in VBE mode. A privileged guest user could use this flaw to crash the Qemu process instance. | An integer overflow flaw and an out-of-bounds read flaw were found in the way QEMU's VGA emulator set certain VGA registers while in VBE mode. A privileged guest user could use this flaw to crash the QEMU process instance. |
| Tomas Hoger | 2017-03-21 09:56:14 UTC | Status | NEW | CLOSED |
| Resolution | --- | ERRATA | ||
| Last Closed | 2017-03-21 05:56:14 UTC | |||
| Product Security DevOps Team | 2019-09-29 13:45:56 UTC | Whiteboard | impact=moderate,public=20160509,reported=20160317,source=researcher,cvss2=3.8/AV:A/AC:M/Au:S/C:P/I:N/A:P,cwe=CWE-125,rhel-5/kvm=wontfix,rhel-5/xen=wontfix,rhel-6/qemu-kvm=affected,rhel-6/qemu-kvm-rhev=wontfix,rhel-7/qemu-kvm=affected,rhel-7/qemu-kvm-rhev=affected,openstack-5/qemu-kvm-rhev=wontfix,openstack-6/qemu-kvm-rhev=wontfix,openstack-7/qemu-kvm-rhev=wontfix,openstack-8/qemu-kvm-rhev=wontfix,fedora-all/qemu=affected,fedora-all/xen=affected |
Back to bug 1318712