Описание
Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 2.1+dfsg-2ubuntu1 |
| esm-infra-legacy/trusty | released | 2.0.0+dfsg-2ubuntu1.3 |
| lucid | DNE | |
| precise | DNE | |
| quantal | DNE | |
| saucy | ignored | end of life |
| trusty | released | 2.0.0+dfsg-2ubuntu1.3 |
| trusty/esm | released | 2.0.0+dfsg-2ubuntu1.3 |
| upstream | needed |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | |
| lucid | released | 0.12.3+noroms-0ubuntu9.24 |
| precise | released | 1.0+noroms-0ubuntu14.17 |
| quantal | ignored | end of life |
| saucy | DNE | |
| trusty | DNE | |
| trusty/esm | DNE | |
| upstream | needed |
Показывать по
EPSS
4.6 Medium
CVSS2
Связанные уязвимости
Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.
Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.
Integer overflow in the qcow_open function in block/qcow.c in QEMU bef ...
Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.
ELSA-2014-1075: qemu-kvm security and bug fix update (MODERATE)
EPSS
4.6 Medium
CVSS2