~ubuntu-security/ubuntu-cve-tracker/master

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
PublicDateAtUSN: 2016-08-19
Candidate: CVE-2016-6888
PublicDate: 2016-12-09
References:
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6888
 https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg03176.html
 http://www.openwall.com/lists/oss-security/2016/08/19/10
 http://www.ubuntu.com/usn/usn-3125-1
Description:
 Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt.c in
 QEMU (aka Quick Emulator) allows local guest OS administrators to cause a
 denial of service (QEMU process crash) via the maximum fragmentation count,
 which triggers an unchecked multiplication and NULL pointer dereference.
Ubuntu-Description:
Notes:
Bugs:
 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834902
Priority: low
Discovered-by: Li Qiang
Assigned-to:

Patches_qemu-kvm:
 upstream: http://git.qemu.org/?p=qemu.git;a=commit;h=47882fa4975bf0b58dd74474329fdd7154e8f04c (head)
 upstream: http://git.qemu.org/?p=qemu.git;a=commit;h=cb3677cd50dcb07e74d0113337e40e9e3e14d728 (2.6)
upstream_qemu-kvm: needs-triage
precise_qemu-kvm: not-affected (code not present)
trusty_qemu-kvm: DNE
vivid/ubuntu-core_qemu-kvm: DNE
vivid/stable-phone-overlay_qemu-kvm: DNE
xenial_qemu-kvm: DNE
yakkety_qemu-kvm: DNE
devel_qemu-kvm: DNE

Patches_qemu:
upstream_qemu: needed
precise_qemu: DNE
trusty_qemu: released (2.0.0+dfsg-2ubuntu1.30)
vivid/ubuntu-core_qemu: DNE
vivid/stable-phone-overlay_qemu: DNE
xenial_qemu: released (1:2.5+dfsg-5ubuntu10.6)
yakkety_qemu: released (1:2.6.1+dfsg-0ubuntu5.1)
devel_qemu: released (1:2.6.1+dfsg-0ubuntu9)