CVE-2014-0182

Publication date 18 April 2014

Last updated 24 July 2024


Ubuntu priority

Heap-based buffer overflow in the virtio_load function in hw/virtio/virtio.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted config length in a savevm image.

Status

Package Ubuntu Release Status
qemu 14.04 LTS trusty
Fixed 2.0.0+dfsg-2ubuntu1.3
13.10 saucy Ignored end of life
12.10 quantal Not in release
12.04 LTS precise Not in release
10.04 LTS lucid Not in release
qemu-kvm 14.04 LTS trusty Not in release
13.10 saucy Not in release
12.10 quantal Ignored end of life
12.04 LTS precise
Fixed 1.0+noroms-0ubuntu14.17
10.04 LTS lucid
Fixed 0.12.3+noroms-0ubuntu9.24

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
qemu

References

Related Ubuntu Security Notices (USN)

    • USN-2342-1
    • QEMU vulnerabilities
    • 8 September 2014

Other references