QEMU (aka Quick Emulator) built to use 'addressspacetranslate' to map an address to a MemoryRegionSection is vulnerable to an OOB r/w access issue. It could occur while doing pcidmaread/write calls. Affects QEMU versions >= 1.6.0 and <= 2.3.1. A privileged user inside guest could use this flaw to crash the guest instance resulting in DoS.
{ "binaries": [ { "binary_name": "qemu", "binary_version": "2.0.0+dfsg-2ubuntu1.47+esm4" }, { "binary_name": "qemu-common", "binary_version": "2.0.0+dfsg-2ubuntu1.47+esm4" }, { "binary_name": "qemu-guest-agent", "binary_version": "2.0.0+dfsg-2ubuntu1.47+esm4" }, { "binary_name": "qemu-keymaps", "binary_version": "2.0.0+dfsg-2ubuntu1.47+esm4" }, { "binary_name": "qemu-kvm", "binary_version": "2.0.0+dfsg-2ubuntu1.47+esm4" }, { "binary_name": "qemu-system", "binary_version": "2.0.0+dfsg-2ubuntu1.47+esm4" }, { "binary_name": "qemu-system-aarch64", "binary_version": "2.0.0+dfsg-2ubuntu1.47+esm4" }, { "binary_name": "qemu-system-arm", "binary_version": "2.0.0+dfsg-2ubuntu1.47+esm4" }, { "binary_name": "qemu-system-common", "binary_version": "2.0.0+dfsg-2ubuntu1.47+esm4" }, { "binary_name": "qemu-system-mips", "binary_version": "2.0.0+dfsg-2ubuntu1.47+esm4" }, { "binary_name": "qemu-system-misc", "binary_version": "2.0.0+dfsg-2ubuntu1.47+esm4" }, { "binary_name": "qemu-system-ppc", "binary_version": "2.0.0+dfsg-2ubuntu1.47+esm4" }, { "binary_name": "qemu-system-sparc", "binary_version": "2.0.0+dfsg-2ubuntu1.47+esm4" }, { "binary_name": "qemu-system-x86", "binary_version": "2.0.0+dfsg-2ubuntu1.47+esm4" }, { "binary_name": "qemu-user", "binary_version": "2.0.0+dfsg-2ubuntu1.47+esm4" }, { "binary_name": "qemu-user-static", "binary_version": "2.0.0+dfsg-2ubuntu1.47+esm4" }, { "binary_name": "qemu-utils", "binary_version": "2.0.0+dfsg-2ubuntu1.47+esm4" } ] }