Количество 12
Количество 12
CVE-2016-6888
Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU process crash) via the maximum fragmentation count, which triggers an unchecked multiplication and NULL pointer dereference.
CVE-2016-6888
Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU process crash) via the maximum fragmentation count, which triggers an unchecked multiplication and NULL pointer dereference.
CVE-2016-6888
Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU process crash) via the maximum fragmentation count, which triggers an unchecked multiplication and NULL pointer dereference.
CVE-2016-6888
Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt. ...
GHSA-fxc3-452x-46r5
Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU process crash) via the maximum fragmentation count, which triggers an unchecked multiplication and NULL pointer dereference.
SUSE-SU-2016:2507-1
Security update for xen
SUSE-SU-2016:2473-1
Security update for xen
openSUSE-SU-2016:2642-1
Security update for qemu
SUSE-SU-2016:2589-1
Security update for qemu
SUSE-SU-2016:2781-1
Security update for qemu
SUSE-SU-2016:2533-1
Security update for xen
openSUSE-SU-2016:2494-1
Security update for xen
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2016-6888 Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU process crash) via the maximum fragmentation count, which triggers an unchecked multiplication and NULL pointer dereference. | CVSS3: 4.4 | 0% Низкий | около 9 лет назад | |
CVE-2016-6888 Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU process crash) via the maximum fragmentation count, which triggers an unchecked multiplication and NULL pointer dereference. | CVSS3: 3.5 | 0% Низкий | больше 9 лет назад | |
CVE-2016-6888 Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU process crash) via the maximum fragmentation count, which triggers an unchecked multiplication and NULL pointer dereference. | CVSS3: 4.4 | 0% Низкий | около 9 лет назад | |
CVE-2016-6888 Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt. ... | CVSS3: 4.4 | 0% Низкий | около 9 лет назад | |
GHSA-fxc3-452x-46r5 Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU process crash) via the maximum fragmentation count, which triggers an unchecked multiplication and NULL pointer dereference. | CVSS3: 4.4 | 0% Низкий | больше 3 лет назад | |
SUSE-SU-2016:2507-1 Security update for xen | больше 9 лет назад | |||
SUSE-SU-2016:2473-1 Security update for xen | больше 9 лет назад | |||
openSUSE-SU-2016:2642-1 Security update for qemu | больше 9 лет назад | |||
SUSE-SU-2016:2589-1 Security update for qemu | больше 9 лет назад | |||
SUSE-SU-2016:2781-1 Security update for qemu | около 9 лет назад | |||
SUSE-SU-2016:2533-1 Security update for xen | больше 9 лет назад | |||
openSUSE-SU-2016:2494-1 Security update for xen | больше 9 лет назад |
Уязвимостей на страницу