Description
QEMU (aka Quick Emulator) built with the TPR optimization for 32-bit Windows guests support is vulnerable to a null pointer dereference flaw. It occurs while doing I/O port write operations via hmp interface. In that, 'current_cpu' remains null, which leads to the null pointer dereference. A user or process could use this flaw to crash the QEMU instance, resulting in DoS issue.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-3469-1 | qemu security update |
Debian DSA |
DSA-3470-1 | qemu-kvm security update |
Debian DSA |
DSA-3471-1 | qemu security update |
EUVD |
EUVD-2016-3012 | QEMU (aka Quick Emulator) built with the TPR optimization for 32-bit Windows guests support is vulnerable to a null pointer dereference flaw. It occurs while doing I/O port write operations via hmp interface. In that, 'current_cpu' remains null, which leads to the null pointer dereference. A user or process could use this flaw to crash the QEMU instance, resulting in DoS issue. |
Ubuntu USN |
USN-2891-1 | QEMU vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T23:10:40.299Z
Reserved: 2016-01-16T00:00:00.000Z
Link: CVE-2016-1922
No data.
Status : Deferred
Published: 2016-12-29T22:59:00.370
Modified: 2025-04-12T10:46:40.837
Link: CVE-2016-1922
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN