An integer underflow issue was found in the QEMU VNC server while processing ClientCutText messages in the extended format. A malicious client could use this flaw to make QEMU unresponsive by sending a specially crafted payload message, resulting in a denial of service.
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "qemu",
"binary_version": "1:6.2+dfsg-2ubuntu6.6"
},
{
"binary_name": "qemu-block-extra",
"binary_version": "1:6.2+dfsg-2ubuntu6.6"
},
{
"binary_name": "qemu-guest-agent",
"binary_version": "1:6.2+dfsg-2ubuntu6.6"
},
{
"binary_name": "qemu-system",
"binary_version": "1:6.2+dfsg-2ubuntu6.6"
},
{
"binary_name": "qemu-system-arm",
"binary_version": "1:6.2+dfsg-2ubuntu6.6"
},
{
"binary_name": "qemu-system-common",
"binary_version": "1:6.2+dfsg-2ubuntu6.6"
},
{
"binary_name": "qemu-system-data",
"binary_version": "1:6.2+dfsg-2ubuntu6.6"
},
{
"binary_name": "qemu-system-gui",
"binary_version": "1:6.2+dfsg-2ubuntu6.6"
},
{
"binary_name": "qemu-system-mips",
"binary_version": "1:6.2+dfsg-2ubuntu6.6"
},
{
"binary_name": "qemu-system-misc",
"binary_version": "1:6.2+dfsg-2ubuntu6.6"
},
{
"binary_name": "qemu-system-ppc",
"binary_version": "1:6.2+dfsg-2ubuntu6.6"
},
{
"binary_name": "qemu-system-s390x",
"binary_version": "1:6.2+dfsg-2ubuntu6.6"
},
{
"binary_name": "qemu-system-sparc",
"binary_version": "1:6.2+dfsg-2ubuntu6.6"
},
{
"binary_name": "qemu-system-x86",
"binary_version": "1:6.2+dfsg-2ubuntu6.6"
},
{
"binary_name": "qemu-system-x86-microvm",
"binary_version": "1:6.2+dfsg-2ubuntu6.6"
},
{
"binary_name": "qemu-system-x86-xen",
"binary_version": "1:6.2+dfsg-2ubuntu6.6"
},
{
"binary_name": "qemu-user",
"binary_version": "1:6.2+dfsg-2ubuntu6.6"
},
{
"binary_name": "qemu-user-binfmt",
"binary_version": "1:6.2+dfsg-2ubuntu6.6"
},
{
"binary_name": "qemu-user-static",
"binary_version": "1:6.2+dfsg-2ubuntu6.6"
},
{
"binary_name": "qemu-utils",
"binary_version": "1:6.2+dfsg-2ubuntu6.6"
}
]
}