QEMU (aka Quick Emulator) built with the TPR optimization for 32-bit Windows guests support is vulnerable to a null pointer dereference flaw. It occurs while doing I/O port write operations via hmp interface. In that, \'current_cpu\' remains null, which leads to the null pointer dereference. A user or process could use this flaw to crash the QEMU instance, resulting in DoS issue.
Find out more about CVE-2016-1922 from the MITRE-CVE dictionary and NIST NVD
Login may be required to access defects or downloads.
Product Name | Status | Defect | Fixed | Downloads |
---|---|---|---|---|
Linux | ||||
Wind River Linux LTS 17 | Not Vulnerable | -- | -- | -- |
Wind River Linux 9 | Not Vulnerable | -- | -- | |
Wind River Linux 8 | Fixed |
LIN8-5556 |
8.0.0.14 |
Wind River Linux 8.0.0.14 Wind River Linux 8.0.0.15 Wind River Linux 8.0.0.16 Wind River Linux 8.0.0.17 Wind River Linux 8.0.0.18 Wind River Linux 8.0.0.19 Wind River Linux 8.0.0.20 Wind River Linux 8.0.0.21 Wind River Linux 8.0.0.22 Wind River Linux 8.0.0.23 Wind River Linux 8.0.0.24 Wind River Linux 8.0.0.25 Wind River Linux 8.0.0.26 Wind River Linux 8.0.0.27 Wind River Linux 8.0.0.28 Wind River Linux 8.0.0.29 Wind River Linux 8.0.0.30 Wind River Linux 8.0.0.31 Wind River Linux 8.0.0.32 Wind River Linux 8.0.0.33 Wind River Linux 8.0.0.34 |
Wind River Linux LTS 18 | Not Vulnerable | -- | -- | -- |
Wind River Linux LTS 19 | Not Vulnerable | -- | -- | -- |
Wind River Linux CD release | Not Vulnerable | -- | -- | -- |
VxWorks | ||||
VxWorks 7 | Not Vulnerable | -- | -- | -- |
VxWorks 6.9 | Not Vulnerable | -- | -- | -- |
Product Name | Status | Defect | Fixed | Downloads |
---|
qemu