cvelist/2016/2xxx/CVE-2016-2857.json

138 lines
4.4 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2016-2857",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "The net_checksum_calculate function in net/checksum.c in QEMU allows local guest OS users to cause a denial of service (out-of-bounds heap read and crash) via the payload length in a crafted packet."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "[oss-security] 20160303 CVE request Qemu: net: out of bounds read in net_checksum_calculate",
"refsource" : "MLIST",
2017-10-16 12:31:07 -04:00
"url" : "http://www.openwall.com/lists/oss-security/2016/03/03/9"
},
{
"name" : "[oss-security] 20160306 Re: CVE request Qemu: net: out of bounds read in net_checksum_calculate",
"refsource" : "MLIST",
2017-10-16 12:31:07 -04:00
"url" : "http://www.openwall.com/lists/oss-security/2016/03/07/3"
},
2018-12-01 06:03:50 -05:00
{
"name" : "[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html"
},
2017-10-16 12:31:07 -04:00
{
"name" : "http://git.qemu.org/?p=qemu.git;a=commitdiff;h=362786f14a753d8a5256ef97d7c10ed576d6572b",
"refsource" : "CONFIRM",
2017-10-16 12:31:07 -04:00
"url" : "http://git.qemu.org/?p=qemu.git;a=commitdiff;h=362786f14a753d8a5256ef97d7c10ed576d6572b"
},
2018-01-04 15:05:12 -05:00
{
"name" : "RHSA-2016:2670",
"refsource" : "REDHAT",
2018-01-04 15:05:12 -05:00
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2670.html"
},
{
"name" : "RHSA-2016:2671",
"refsource" : "REDHAT",
2018-01-04 15:05:12 -05:00
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2671.html"
},
{
"name" : "RHSA-2016:2704",
"refsource" : "REDHAT",
2018-01-04 15:05:12 -05:00
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2704.html"
},
{
"name" : "RHSA-2016:2705",
"refsource" : "REDHAT",
2018-01-04 15:05:12 -05:00
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2705.html"
},
{
"name" : "RHSA-2016:2706",
"refsource" : "REDHAT",
2018-01-04 15:05:12 -05:00
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2706.html"
},
{
"name" : "RHSA-2017:0083",
"refsource" : "REDHAT",
2018-01-04 15:05:12 -05:00
"url" : "http://rhn.redhat.com/errata/RHSA-2017-0083.html"
},
{
"name" : "RHSA-2017:0309",
"refsource" : "REDHAT",
2018-01-04 15:05:12 -05:00
"url" : "http://rhn.redhat.com/errata/RHSA-2017-0309.html"
},
{
"name" : "RHSA-2017:0334",
"refsource" : "REDHAT",
2018-01-04 15:05:12 -05:00
"url" : "http://rhn.redhat.com/errata/RHSA-2017-0334.html"
},
{
"name" : "RHSA-2017:0344",
"refsource" : "REDHAT",
2018-01-04 15:05:12 -05:00
"url" : "http://rhn.redhat.com/errata/RHSA-2017-0344.html"
},
{
"name" : "RHSA-2017:0350",
"refsource" : "REDHAT",
2018-01-04 15:05:12 -05:00
"url" : "http://rhn.redhat.com/errata/RHSA-2017-0350.html"
},
2017-10-16 12:31:07 -04:00
{
"name" : "USN-2974-1",
"refsource" : "UBUNTU",
2017-10-16 12:31:07 -04:00
"url" : "http://www.ubuntu.com/usn/USN-2974-1"
},
{
"name" : "84130",
"refsource" : "BID",
2017-10-16 12:31:07 -04:00
"url" : "http://www.securityfocus.com/bid/84130"
}
]
}
}