CVE-2016-6888

Priority
Description
Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt.c in
QEMU (aka Quick Emulator) allows local guest OS administrators to cause a
denial of service (QEMU process crash) via the maximum fragmentation count,
which triggers an unchecked multiplication and NULL pointer dereference.
Notes
Package
Source: qemu (LP Ubuntu Debian)
Upstream:needed
Ubuntu 14.04 ESM (Trusty Tahr):released (2.0.0+dfsg-2ubuntu1.30)
Ubuntu 16.04 LTS (Xenial Xerus):released (1:2.5+dfsg-5ubuntu10.6)
Package
Upstream:needs-triage
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Patches:
Upstream:http://git.qemu.org/?p=qemu.git;a=commit;h=47882fa4975bf0b58dd74474329fdd7154e8f04c (head)
Upstream:http://git.qemu.org/?p=qemu.git;a=commit;h=cb3677cd50dcb07e74d0113337e40e9e3e14d728 (2.6)
More Information

Updated: 2019-12-05 18:46:02 UTC (commit dd38ff22974aae499eb50644b9d5a2817483cbdb)