QEMU before 2.0.0 block drivers for CLOOP, QCOW2 version 2 and various other image formats are vulnerable to potential memory corruptions, integer/buffer overflows or crash caused by missing input validations which could allow a remote user to execute arbitrary code on the host with the privileges of the QEMU process.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "qemu-system-misc": "2.0.0~rc1+dfsg-0ubuntu3", "qemu-system": "2.0.0~rc1+dfsg-0ubuntu3", "qemu-guest-agent": "2.0.0~rc1+dfsg-0ubuntu3", "qemu-utils": "2.0.0~rc1+dfsg-0ubuntu3", "qemu-user": "2.0.0~rc1+dfsg-0ubuntu3", "qemu-kvm": "2.0.0~rc1+dfsg-0ubuntu3", "qemu-system-aarch64": "2.0.0~rc1+dfsg-0ubuntu3", "qemu-user-static": "2.0.0~rc1+dfsg-0ubuntu3", "qemu-system-arm": "2.0.0~rc1+dfsg-0ubuntu3", "qemu-system-x86": "2.0.0~rc1+dfsg-0ubuntu3", "qemu-system-ppc": "2.0.0~rc1+dfsg-0ubuntu3", "qemu": "2.0.0~rc1+dfsg-0ubuntu3", "qemu-system-common": "2.0.0~rc1+dfsg-0ubuntu3", "qemu-keymaps": "2.0.0~rc1+dfsg-0ubuntu3", "qemu-system-sparc": "2.0.0~rc1+dfsg-0ubuntu3", "qemu-system-mips": "2.0.0~rc1+dfsg-0ubuntu3", "qemu-common": "2.0.0~rc1+dfsg-0ubuntu3" } ] }