The net_tx_pkt_do_sw_fragmentation function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a zero length for the current fragment length.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=ead315e43ea0c2ca3491209c6c8db8ce3f2bbe05 | |
http://www.securityfocus.com/bid/92446 | vdb entry third party advisory |
https://security.gentoo.org/glsa/201609-01 | third party advisory vendor advisory |
http://www.openwall.com/lists/oss-security/2016/08/18/7 | third party advisory mailing list |
https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg01601.html | mailing list third party advisory patch |
http://www.openwall.com/lists/oss-security/2016/08/11/8 | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html | third party advisory mailing list |