Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-6835

Опубликовано: 10 дек. 2016
Источник: debian

Описание

The vmxnet_tx_pkt_parse_headers function in hw/net/vmxnet_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (buffer over-read) by leveraging failure to check IP header length.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemufixed1:2.6+dfsg-3.1package
qemunot-affectedwheezypackage
qemu-kvmremovedpackage
qemu-kvmnot-affectedwheezypackage

Примечания

  • Upstream patch: https://lists.gnu.org/archive/html/qemu-stable/2016-08/msg00077.html

  • https://www.openwall.com/lists/oss-security/2016/08/11/7

Связанные уязвимости

CVSS3: 6
ubuntu
около 9 лет назад

The vmxnet_tx_pkt_parse_headers function in hw/net/vmxnet_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (buffer over-read) by leveraging failure to check IP header length.

CVSS3: 4.6
redhat
больше 9 лет назад

The vmxnet_tx_pkt_parse_headers function in hw/net/vmxnet_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (buffer over-read) by leveraging failure to check IP header length.

CVSS3: 6
nvd
около 9 лет назад

The vmxnet_tx_pkt_parse_headers function in hw/net/vmxnet_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (buffer over-read) by leveraging failure to check IP header length.

CVSS3: 6
github
больше 3 лет назад

The vmxnet_tx_pkt_parse_headers function in hw/net/vmxnet_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (buffer over-read) by leveraging failure to check IP header length.

suse-cvrf
больше 9 лет назад

Security update for xen