The virtioscsiload_request function in hw/scsi/scsi-bus.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted savevm image, which triggers an out-of-bounds array access.
{ "ubuntu_priority": "low", "availability": "No subscription required", "binaries": [ { "binary_name": "qemu", "binary_version": "2.0.0+dfsg-2ubuntu1.3" }, { "binary_name": "qemu-common", "binary_version": "2.0.0+dfsg-2ubuntu1.3" }, { "binary_name": "qemu-guest-agent", "binary_version": "2.0.0+dfsg-2ubuntu1.3" }, { "binary_name": "qemu-keymaps", "binary_version": "2.0.0+dfsg-2ubuntu1.3" }, { "binary_name": "qemu-kvm", "binary_version": "2.0.0+dfsg-2ubuntu1.3" }, { "binary_name": "qemu-system", "binary_version": "2.0.0+dfsg-2ubuntu1.3" }, { "binary_name": "qemu-system-aarch64", "binary_version": "2.0.0+dfsg-2ubuntu1.3" }, { "binary_name": "qemu-system-arm", "binary_version": "2.0.0+dfsg-2ubuntu1.3" }, { "binary_name": "qemu-system-common", "binary_version": "2.0.0+dfsg-2ubuntu1.3" }, { "binary_name": "qemu-system-mips", "binary_version": "2.0.0+dfsg-2ubuntu1.3" }, { "binary_name": "qemu-system-misc", "binary_version": "2.0.0+dfsg-2ubuntu1.3" }, { "binary_name": "qemu-system-ppc", "binary_version": "2.0.0+dfsg-2ubuntu1.3" }, { "binary_name": "qemu-system-sparc", "binary_version": "2.0.0+dfsg-2ubuntu1.3" }, { "binary_name": "qemu-system-x86", "binary_version": "2.0.0+dfsg-2ubuntu1.3" }, { "binary_name": "qemu-user", "binary_version": "2.0.0+dfsg-2ubuntu1.3" }, { "binary_name": "qemu-user-static", "binary_version": "2.0.0+dfsg-2ubuntu1.3" }, { "binary_name": "qemu-utils", "binary_version": "2.0.0+dfsg-2ubuntu1.3" } ] }