Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU process crash) via the maximum fragmentation count, which triggers an unchecked multiplication and NULL pointer dereference.
2016-12-10T00:59:09.370
2025-04-12T10:46:40.837
Deferred
CVSSv3.1: 4.4 (MEDIUM)
AV:L/AC:L/Au:N/C:N/I:N/A:P
3.9
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | qemu | qemu | ≤ 2.6.2 | Yes |
Application | qemu | qemu | 2.7.0 | Yes |
Application | qemu | qemu | 2.7.0 | Yes |
Application | qemu | qemu | 2.7.0 | Yes |
Application | qemu | qemu | 2.7.0 | Yes |
Operating System | debian | debian_linux | 8.0 | Yes |
Application | redhat | virtualization | 4.0 | Yes |
Operating System | redhat | enterprise_linux | 7.0 | No |
Application | redhat | openstack | 6.0 | Yes |
Application | redhat | openstack | 7.0 | Yes |
Application | redhat | openstack | 8 | Yes |
Application | redhat | openstack | 9 | Yes |
Application | redhat | openstack | 10 | Yes |
Application | redhat | openstack | 11 | Yes |