Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU process crash) via the maximum fragmentation count, which triggers an unchecked multiplication and NULL pointer dereference.
https://security.gentoo.org/glsa/201609-01
https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg03176.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
https://access.redhat.com/errata/RHSA-2017:2408
https://access.redhat.com/errata/RHSA-2017:2392
http://www.securityfocus.com/bid/92556
http://www.openwall.com/lists/oss-security/2016/08/19/6
http://www.openwall.com/lists/oss-security/2016/08/19/10