hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "qemu-system-misc": "2.0.0+dfsg-2ubuntu1.3", "qemu-system": "2.0.0+dfsg-2ubuntu1.3", "qemu-guest-agent": "2.0.0+dfsg-2ubuntu1.3", "qemu-utils": "2.0.0+dfsg-2ubuntu1.3", "qemu-user": "2.0.0+dfsg-2ubuntu1.3", "qemu-kvm": "2.0.0+dfsg-2ubuntu1.3", "qemu-system-aarch64": "2.0.0+dfsg-2ubuntu1.3", "qemu-user-static": "2.0.0+dfsg-2ubuntu1.3", "qemu-system-arm": "2.0.0+dfsg-2ubuntu1.3", "qemu-system-x86": "2.0.0+dfsg-2ubuntu1.3", "qemu-system-ppc": "2.0.0+dfsg-2ubuntu1.3", "qemu": "2.0.0+dfsg-2ubuntu1.3", "qemu-system-common": "2.0.0+dfsg-2ubuntu1.3", "qemu-keymaps": "2.0.0+dfsg-2ubuntu1.3", "qemu-system-sparc": "2.0.0+dfsg-2ubuntu1.3", "qemu-system-mips": "2.0.0+dfsg-2ubuntu1.3", "qemu-common": "2.0.0+dfsg-2ubuntu1.3" } ] }