CVE-2014-0147
29.09.2022, 03:15
Qemu before 1.6.2 block diver for the various disk image formats used by Bochs and for the QCOW version 2 format, are vulnerable to a possible crash caused by signed data types or a logic error while creating QCOW2 snapshots, which leads to incorrectly calling update_refcount() routine.Enginsight
Vendor | Product | Version |
---|---|---|
qemu | qemu | 𝑥 < 1.6.2 |
redhat | virtualization | 3.0 |
redhat | enterprise_linux_desktop | 6.0 |
redhat | enterprise_linux_eus | 6.5 |
redhat | enterprise_linux_server | 6.0 |
redhat | enterprise_linux_server_aus | 6.5 |
redhat | enterprise_linux_server_tus | 6.5 |
redhat | enterprise_linux_workstation | 6.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
References