CVE-2014-0223

Priority
Description
Integer overflow in the qcow_open function in block/qcow.c in QEMU before
1.7.2 allows local users to cause a denial of service (crash) and possibly
execute arbitrary code via a large image size, which triggers a buffer
overflow or out-of-bounds read.
Assigned-to
mdeslaur
Package
Source: qemu (LP Ubuntu Debian)
Upstream:needed
Ubuntu 14.04 LTS (Trusty Tahr):released (2.0.0+dfsg-2ubuntu1.3)
Patches:
Upstream:http://git.qemu.org/?p=qemu.git;a=commit;h=46485de0cb357b57373e1ca895adedf1f3ed46ec
Package
Upstream:needed
Ubuntu 14.04 LTS (Trusty Tahr):DNE
More Information

Updated: 2019-03-19 12:13:51 UTC (commit 15472795df7e9de45b82f2d36b8b419b939f97b2)