High severity8.1NVD Advisory· Published Apr 7, 2016· Updated May 6, 2026
CVE-2016-1714
CVE-2016-1714
Description
The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c in QEMU before 2.4, when built with the Firmware Configuration device emulation support, allow guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access and process crash) or possibly execute arbitrary code via an invalid current entry value in a firmware configuration.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
19- rhn.redhat.com/errata/RHSA-2016-0085.htmlnvdIssue TrackingThird Party AdvisoryVDB Entry
- rhn.redhat.com/errata/RHSA-2016-0088.htmlnvdIssue TrackingThird Party AdvisoryVDB Entry
- www.openwall.com/lists/oss-security/2016/01/11/7nvdThird Party Advisory
- www.openwall.com/lists/oss-security/2016/01/12/10nvdThird Party Advisory
- www.openwall.com/lists/oss-security/2016/01/12/11nvdThird Party Advisory
- www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.htmlnvdThird Party Advisory
- www.securityfocus.com/bid/80250nvdThird Party Advisory
- www.securitytracker.com/id/1034858nvdThird Party Advisory
- lists.gnu.org/archive/html/qemu-devel/2016-01/msg00428.htmlnvdVendor Advisory
- rhn.redhat.com/errata/RHSA-2016-0081.htmlnvd
- rhn.redhat.com/errata/RHSA-2016-0082.htmlnvd
- rhn.redhat.com/errata/RHSA-2016-0083.htmlnvd
- rhn.redhat.com/errata/RHSA-2016-0084.htmlnvd
- rhn.redhat.com/errata/RHSA-2016-0086.htmlnvd
- rhn.redhat.com/errata/RHSA-2016-0087.htmlnvd
- www.debian.org/security/2016/dsa-3469nvd
- www.debian.org/security/2016/dsa-3470nvd
- www.debian.org/security/2016/dsa-3471nvd
- security.gentoo.org/glsa/201604-01nvd
News mentions
0No linked articles in our index yet.