CVE List

Id CVE No. Status Description Phase Votes Comments Actions
93651  CVE-2016-6831  Candidate  The "process-execute" and "process-spawn" procedures did not free memory correctly when the execve() call failed, resulting in a memory leak. This could be abused by an attacker to cause resource exhaustion or a denial of service. This affects all releases of CHICKEN up to and including 4.11 (it will be fixed in 4.12 and 5.0, which are not yet released).  Assigned (20160817)  None (candidate not yet proposed)    View
93652  CVE-2016-6832  Candidate  Heap-based buffer overflow in the ff_audio_resample function in resample.c in libav before 11.4 allows remote attackers to cause a denial of service (crash) via vectors related to buffer resizing.  Assigned (20160817)  None (candidate not yet proposed)    View
93653  CVE-2016-6833  Candidate  Use-after-free vulnerability in the vmxnet3_io_bar0_write function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU instance crash) by leveraging failure to check if the device is active.  Assigned (20160817)  None (candidate not yet proposed)    View
93654  CVE-2016-6834  Candidate  The net_tx_pkt_do_sw_fragmentation function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a zero length for the current fragment length.  Assigned (20160817)  None (candidate not yet proposed)    View
93655  CVE-2016-6835  Candidate  The vmxnet_tx_pkt_parse_headers function in hw/net/vmxnet_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (buffer over-read) by leveraging failure to check IP header length.  Assigned (20160817)  None (candidate not yet proposed)    View

Page 18731 of 20943, showing 5 records out of 104715 total, starting on record 93651, ending on 93655

Actions