Integer overflow in the nettxpktinit function in hw/net/nettx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU process crash) via the maximum fragmentation count, which triggers an unchecked multiplication and NULL pointer dereference.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "2.6.2"
},
{
"introduced": "0"
},
{
"last_affected": "2.7.0-rc0"
},
{
"introduced": "0"
},
{
"last_affected": "2.7.0-rc1"
},
{
"introduced": "0"
},
{
"last_affected": "2.7.0-rc2"
},
{
"introduced": "0"
},
{
"last_affected": "2.7.0-rc3"
},
{
"introduced": "0"
},
{
"last_affected": "8.0"
},
{
"introduced": "0"
},
{
"last_affected": "4.0"
},
{
"introduced": "0"
},
{
"last_affected": "6.0"
},
{
"introduced": "0"
},
{
"last_affected": "7.0"
}
]
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-6888.json"
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "11"
}
]
}
]