CVE-2014-0147
29.09.2022, 03:15
Qemu before 1.6.2 block diver for the various disk image formats used by Bochs and for the QCOW version 2 format, are vulnerable to a possible crash caused by signed data types or a logic error while creating QCOW2 snapshots, which leads to incorrectly calling update_refcount() routine.Enginsight
| Vendor | Product | Version |
|---|---|---|
| qemu | qemu | 𝑥 < 1.6.2 |
| redhat | virtualization | 3.0 |
| redhat | enterprise_linux_desktop | 6.0 |
| redhat | enterprise_linux_eus | 6.5 |
| redhat | enterprise_linux_server | 6.0 |
| redhat | enterprise_linux_server_aus | 6.5 |
| redhat | enterprise_linux_server_tus | 6.5 |
| redhat | enterprise_linux_workstation | 6.0 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
References