Medium severity5.5NVD Advisory· Published Dec 29, 2016· Updated May 6, 2026
CVE-2016-1981
CVE-2016-1981
Description
QEMU (aka Quick Emulator) built with the e1000 NIC emulation support is vulnerable to an infinite loop issue. It could occur while processing data via transmit or receive descriptors, provided the initial receive/transmit descriptor head (TDH/RDH) is set outside the allocated descriptor buffer. A privileged user inside guest could use this flaw to crash the QEMU instance resulting in DoS.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- lists.gnu.org/archive/html/qemu-devel/2016-01/msg03454.htmlnvdPatchVendor Advisory
- rhn.redhat.com/errata/RHSA-2016-2585.htmlnvdThird Party Advisory
- www.debian.org/security/2016/dsa-3469nvdThird Party Advisory
- www.debian.org/security/2016/dsa-3470nvdThird Party Advisory
- www.debian.org/security/2016/dsa-3471nvdThird Party Advisory
- www.openwall.com/lists/oss-security/2016/01/19/10nvdMailing ListThird Party Advisory
- www.openwall.com/lists/oss-security/2016/01/22/1nvdMailing ListThird Party Advisory
- www.securityfocus.com/bid/81549nvdThird Party AdvisoryVDB Entry
- security.gentoo.org/glsa/201604-01nvdThird Party Advisory
- bugzilla.redhat.com/show_bug.cginvdIssue Tracking
News mentions
0No linked articles in our index yet.