CVE-2014-0147

Qemu before 1.6.2 block diver for the various disk image formats used by Bochs and for the QCOW version 2 format, are vulnerable to a possible crash caused by signed data types or a logic error while creating QCOW2 snapshots, which leads to incorrectly calling update_refcount() routine.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.2 MEDIUM
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 15%
VendorProductVersion
qemuqemu
𝑥
< 1.6.2
redhatvirtualization
3.0
redhatenterprise_linux_desktop
6.0
redhatenterprise_linux_eus
6.5
redhatenterprise_linux_server
6.0
redhatenterprise_linux_server_aus
6.5
redhatenterprise_linux_server_tus
6.5
redhatenterprise_linux_workstation
6.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
qemu
bullseye
1:5.2+dfsg-11+deb11u3
fixed
bullseye (security)
1:5.2+dfsg-11+deb11u2
fixed
bookworm
1:7.2+dfsg-7+deb12u7
fixed
sid
1:9.1.1+ds-2
fixed
trixie
1:9.1.1+ds-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
qemu
trusty
not-affected
saucy
ignored
quantal
dne
precise
dne
lucid
dne
qemu-kvm
trusty
dne
saucy
dne
quantal
ignored
precise
Fixed 1.0+noroms-0ubuntu14.17
released
lucid
Fixed 0.12.3+noroms-0ubuntu9.24
released