CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
93651 | CVE-2016-6831 | Candidate | The "process-execute" and "process-spawn" procedures did not free memory correctly when the execve() call failed, resulting in a memory leak. This could be abused by an attacker to cause resource exhaustion or a denial of service. This affects all releases of CHICKEN up to and including 4.11 (it will be fixed in 4.12 and 5.0, which are not yet released). | Assigned (20160817) | None (candidate not yet proposed) | View | |
93652 | CVE-2016-6832 | Candidate | Heap-based buffer overflow in the ff_audio_resample function in resample.c in libav before 11.4 allows remote attackers to cause a denial of service (crash) via vectors related to buffer resizing. | Assigned (20160817) | None (candidate not yet proposed) | View | |
93653 | CVE-2016-6833 | Candidate | Use-after-free vulnerability in the vmxnet3_io_bar0_write function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU instance crash) by leveraging failure to check if the device is active. | Assigned (20160817) | None (candidate not yet proposed) | View | |
93654 | CVE-2016-6834 | Candidate | The net_tx_pkt_do_sw_fragmentation function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a zero length for the current fragment length. | Assigned (20160817) | None (candidate not yet proposed) | View | |
93655 | CVE-2016-6835 | Candidate | The vmxnet_tx_pkt_parse_headers function in hw/net/vmxnet_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (buffer over-read) by leveraging failure to check IP header length. | Assigned (20160817) | None (candidate not yet proposed) | View |
Page 18731 of 20943, showing 5 records out of 104715 total, starting on record 93651, ending on 93655