Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-0147

Опубликовано: 29 сент. 2022
Источник: debian

Описание

Qemu before 1.6.2 block diver for the various disk image formats used by Bochs and for the QCOW version 2 format, are vulnerable to a possible crash caused by signed data types or a logic error while creating QCOW2 snapshots, which leads to incorrectly calling update_refcount() routine.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemufixed2.0.0+dfsg-1package
qemu-kvmremovedpackage
qemuend-of-lifesqueezepackage
qemu-kvmend-of-lifesqueezepackage

Связанные уязвимости

CVSS3: 6.2
ubuntu
больше 2 лет назад

Qemu before 1.6.2 block diver for the various disk image formats used by Bochs and for the QCOW version 2 format, are vulnerable to a possible crash caused by signed data types or a logic error while creating QCOW2 snapshots, which leads to incorrectly calling update_refcount() routine.

redhat
около 11 лет назад

Qemu before 1.6.2 block diver for the various disk image formats used by Bochs and for the QCOW version 2 format, are vulnerable to a possible crash caused by signed data types or a logic error while creating QCOW2 snapshots, which leads to incorrectly calling update_refcount() routine.

CVSS3: 6.2
nvd
больше 2 лет назад

Qemu before 1.6.2 block diver for the various disk image formats used by Bochs and for the QCOW version 2 format, are vulnerable to a possible crash caused by signed data types or a logic error while creating QCOW2 snapshots, which leads to incorrectly calling update_refcount() routine.

CVSS3: 6.2
github
больше 2 лет назад

Qemu before 1.6.2 block diver for the various disk image formats used by Bochs and for the QCOW version 2 format, are vulnerable to a possible crash caused by signed data types or a logic error while creating QCOW2 snapshots, which leads to incorrectly calling update_refcount() routine.

oracle-oval
около 11 лет назад

ELSA-2014-0420: qemu-kvm security update (MODERATE)