CVE-2014-0223

Publication date 13 May 2014

Last updated 24 July 2024


Ubuntu priority

Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.

Status

Package Ubuntu Release Status
qemu 14.04 LTS trusty
Fixed 2.0.0+dfsg-2ubuntu1.3
13.10 saucy Ignored end of life
12.10 quantal Not in release
12.04 LTS precise Not in release
10.04 LTS lucid Not in release
qemu-kvm 14.04 LTS trusty Not in release
13.10 saucy Not in release
12.10 quantal Ignored end of life
12.04 LTS precise
Fixed 1.0+noroms-0ubuntu14.17
10.04 LTS lucid
Fixed 0.12.3+noroms-0ubuntu9.24

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
qemu

References

Related Ubuntu Security Notices (USN)

    • USN-2342-1
    • QEMU vulnerabilities
    • 8 September 2014

Other references