CVE-2016-6888
10.12.2016, 00:59
Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU process crash) via the maximum fragmentation count, which triggers an unchecked multiplication and NULL pointer dereference.Enginsight
Vendor | Product | Version |
---|---|---|
qemu | qemu | 𝑥 ≤ 2.6.2 |
qemu | qemu | 2.7.0:rc0 |
qemu | qemu | 2.7.0:rc1 |
qemu | qemu | 2.7.0:rc2 |
qemu | qemu | 2.7.0:rc3 |
debian | debian_linux | 8.0 |
redhat | virtualization | 4.0 |
redhat | openstack | 6.0 |
redhat | openstack | 7.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
References