The virtqueuemapsg function in hw/virtio/virtio.c in QEMU before 1.7.2 allows remote attackers to execute arbitrary files via a crafted savevm image, related to virtio-block or virtio-serial read.
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "qemu-system-misc": "2.0.0+dfsg-2ubuntu1.3", "qemu-system": "2.0.0+dfsg-2ubuntu1.3", "qemu-guest-agent": "2.0.0+dfsg-2ubuntu1.3", "qemu-utils": "2.0.0+dfsg-2ubuntu1.3", "qemu-user": "2.0.0+dfsg-2ubuntu1.3", "qemu-kvm": "2.0.0+dfsg-2ubuntu1.3", "qemu-system-aarch64": "2.0.0+dfsg-2ubuntu1.3", "qemu-user-static": "2.0.0+dfsg-2ubuntu1.3", "qemu-system-arm": "2.0.0+dfsg-2ubuntu1.3", "qemu-system-x86": "2.0.0+dfsg-2ubuntu1.3", "qemu-system-ppc": "2.0.0+dfsg-2ubuntu1.3", "qemu": "2.0.0+dfsg-2ubuntu1.3", "qemu-system-common": "2.0.0+dfsg-2ubuntu1.3", "qemu-keymaps": "2.0.0+dfsg-2ubuntu1.3", "qemu-system-sparc": "2.0.0+dfsg-2ubuntu1.3", "qemu-system-mips": "2.0.0+dfsg-2ubuntu1.3", "qemu-common": "2.0.0+dfsg-2ubuntu1.3" } ] }