First published: Mon Aug 22 2016(Updated: )
Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU process crash) via the maximum fragmentation count, which triggers an unchecked multiplication and NULL pointer dereference.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU | <=2.6.2 | |
QEMU | =2.7.0-rc0 | |
QEMU | =2.7.0-rc1 | |
QEMU | =2.7.0-rc2 | |
QEMU | =2.7.0-rc3 | |
Debian Linux | =8.0 | |
Red Hat Enterprise Virtualization | =4.0 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat OpenStack for IBM Power | =6.0 | |
Red Hat OpenStack for IBM Power | =7.0 | |
Red Hat OpenStack for IBM Power | =8 | |
Red Hat OpenStack for IBM Power | =9 | |
Red Hat OpenStack for IBM Power | =10 | |
Red Hat OpenStack for IBM Power | =11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-6888 is classified as medium, as it can lead to a denial of service by crashing the QEMU process.
To fix CVE-2016-6888, update QEMU to version 2.7.0 or later, or apply any available patches provided by your distribution.
CVE-2016-6888 affects QEMU versions up to 2.6.2 and the 2.7.0 release candidates.
CVE-2016-6888 cannot be exploited remotely as it requires local guest OS administrator access.
The impact of CVE-2016-6888 is a denial of service, causing the QEMU process to crash due to an integer overflow.