An integer underflow issue was found in the QEMU VNC server while processing ClientCutText messages in the extended format. A malicious client could use this flaw to make QEMU unresponsive by sending a specially crafted payload message, resulting in a denial of service.
{ "binaries": [ { "binary_name": "qemu", "binary_version": "1:6.2+dfsg-2ubuntu6.6" }, { "binary_name": "qemu-block-extra", "binary_version": "1:6.2+dfsg-2ubuntu6.6" }, { "binary_name": "qemu-guest-agent", "binary_version": "1:6.2+dfsg-2ubuntu6.6" }, { "binary_name": "qemu-system", "binary_version": "1:6.2+dfsg-2ubuntu6.6" }, { "binary_name": "qemu-system-arm", "binary_version": "1:6.2+dfsg-2ubuntu6.6" }, { "binary_name": "qemu-system-common", "binary_version": "1:6.2+dfsg-2ubuntu6.6" }, { "binary_name": "qemu-system-data", "binary_version": "1:6.2+dfsg-2ubuntu6.6" }, { "binary_name": "qemu-system-gui", "binary_version": "1:6.2+dfsg-2ubuntu6.6" }, { "binary_name": "qemu-system-mips", "binary_version": "1:6.2+dfsg-2ubuntu6.6" }, { "binary_name": "qemu-system-misc", "binary_version": "1:6.2+dfsg-2ubuntu6.6" }, { "binary_name": "qemu-system-ppc", "binary_version": "1:6.2+dfsg-2ubuntu6.6" }, { "binary_name": "qemu-system-s390x", "binary_version": "1:6.2+dfsg-2ubuntu6.6" }, { "binary_name": "qemu-system-sparc", "binary_version": "1:6.2+dfsg-2ubuntu6.6" }, { "binary_name": "qemu-system-x86", "binary_version": "1:6.2+dfsg-2ubuntu6.6" }, { "binary_name": "qemu-system-x86-microvm", "binary_version": "1:6.2+dfsg-2ubuntu6.6" }, { "binary_name": "qemu-system-x86-xen", "binary_version": "1:6.2+dfsg-2ubuntu6.6" }, { "binary_name": "qemu-user", "binary_version": "1:6.2+dfsg-2ubuntu6.6" }, { "binary_name": "qemu-user-binfmt", "binary_version": "1:6.2+dfsg-2ubuntu6.6" }, { "binary_name": "qemu-user-static", "binary_version": "1:6.2+dfsg-2ubuntu6.6" }, { "binary_name": "qemu-utils", "binary_version": "1:6.2+dfsg-2ubuntu6.6" } ], "availability": "No subscription required" }