CVE-2014-0223
Publication date 13 May 2014
Last updated 24 July 2024
Ubuntu priority
Description
Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.
Status
| Package | Ubuntu Release | Status | 
|---|---|---|
| qemu | 14.04 LTS trusty | 
                              
                               
                                Fixed 2.0.0+dfsg-2ubuntu1.3 
                                
                               
                             |      
                          
                            
                          
                        
                      
| qemu-kvm | 14.04 LTS trusty | Not in release | 
Patch details
| Package | Patch details | 
|---|---|
| qemu | 
References
Related Ubuntu Security Notices (USN)
- USN-2342-1
 - QEMU vulnerabilities
 - 8 September 2014