Medium severity6.0NVD Advisory· Published Dec 10, 2016· Updated May 6, 2026
CVE-2016-6835
CVE-2016-6835
Description
The vmxnet_tx_pkt_parse_headers function in hw/net/vmxnet_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (buffer over-read) by leveraging failure to check IP header length.
Affected products
3- cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- lists.gnu.org/archive/html/qemu-stable/2016-08/msg00077.htmlnvdPatchVendor Advisory
- www.openwall.com/lists/oss-security/2016/08/11/7nvdMailing ListThird Party Advisory
- www.openwall.com/lists/oss-security/2016/08/18/4nvdMailing ListThird Party Advisory
- access.redhat.com/errata/RHSA-2017:2392nvdThird Party Advisory
- lists.debian.org/debian-lts-announce/2018/09/msg00007.htmlnvdMailing ListThird Party Advisory
News mentions
0No linked articles in our index yet.