Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "qemu-system-misc": "2.0.0+dfsg-2ubuntu1.3", "qemu-system": "2.0.0+dfsg-2ubuntu1.3", "qemu-guest-agent": "2.0.0+dfsg-2ubuntu1.3", "qemu-utils": "2.0.0+dfsg-2ubuntu1.3", "qemu-user": "2.0.0+dfsg-2ubuntu1.3", "qemu-kvm": "2.0.0+dfsg-2ubuntu1.3", "qemu-system-aarch64": "2.0.0+dfsg-2ubuntu1.3", "qemu-user-static": "2.0.0+dfsg-2ubuntu1.3", "qemu-system-arm": "2.0.0+dfsg-2ubuntu1.3", "qemu-system-x86": "2.0.0+dfsg-2ubuntu1.3", "qemu-system-ppc": "2.0.0+dfsg-2ubuntu1.3", "qemu": "2.0.0+dfsg-2ubuntu1.3", "qemu-system-common": "2.0.0+dfsg-2ubuntu1.3", "qemu-keymaps": "2.0.0+dfsg-2ubuntu1.3", "qemu-system-sparc": "2.0.0+dfsg-2ubuntu1.3", "qemu-system-mips": "2.0.0+dfsg-2ubuntu1.3", "qemu-common": "2.0.0+dfsg-2ubuntu1.3" } ] }