CVE-2014-0223

Priority
Description
Integer overflow in the qcow_open function in block/qcow.c in QEMU before
1.7.2 allows local users to cause a denial of service (crash) and possibly
execute arbitrary code via a large image size, which triggers a buffer
overflow or out-of-bounds read.
Assigned-to
mdeslaur
Notes
Package
Source: qemu (LP Ubuntu Debian)
Upstream:needed
Ubuntu 14.04 ESM (Trusty Tahr):released (2.0.0+dfsg-2ubuntu1.3)
Patches:
Upstream:http://git.qemu.org/?p=qemu.git;a=commit;h=46485de0cb357b57373e1ca895adedf1f3ed46ec
Package
Upstream:needed
Ubuntu 14.04 ESM (Trusty Tahr):DNE
More Information

Updated: 2020-03-18 22:14:38 UTC (commit 2ea7df7bd1e69e1e489978d2724a936eb3faa1b8)