Описание
Qemu before 1.6.2 block diver for the various disk image formats used by Bochs and for the QCOW version 2 format, are vulnerable to a possible crash caused by signed data types or a logic error while creating QCOW2 snapshots, which leads to incorrectly calling update_refcount() routine.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 2.0.0~rc1+dfsg-0ubuntu3 |
esm-infra-legacy/trusty | not-affected | 2.0.0~rc1+dfsg-0ubuntu3 |
lucid | DNE | |
precise | DNE | |
quantal | DNE | |
saucy | ignored | end of life |
trusty | not-affected | 2.0.0~rc1+dfsg-0ubuntu3 |
trusty/esm | not-affected | 2.0.0~rc1+dfsg-0ubuntu3 |
upstream | released | 1.7.2, 2.0 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
lucid | released | 0.12.3+noroms-0ubuntu9.24 |
precise | released | 1.0+noroms-0ubuntu14.17 |
quantal | ignored | end of life |
saucy | DNE | |
trusty | DNE | |
trusty/esm | DNE | |
upstream | needs-triage |
Показывать по
6.2 Medium
CVSS3
Связанные уязвимости
Qemu before 1.6.2 block diver for the various disk image formats used by Bochs and for the QCOW version 2 format, are vulnerable to a possible crash caused by signed data types or a logic error while creating QCOW2 snapshots, which leads to incorrectly calling update_refcount() routine.
Qemu before 1.6.2 block diver for the various disk image formats used by Bochs and for the QCOW version 2 format, are vulnerable to a possible crash caused by signed data types or a logic error while creating QCOW2 snapshots, which leads to incorrectly calling update_refcount() routine.
Qemu before 1.6.2 block diver for the various disk image formats used ...
Qemu before 1.6.2 block diver for the various disk image formats used by Bochs and for the QCOW version 2 format, are vulnerable to a possible crash caused by signed data types or a logic error while creating QCOW2 snapshots, which leads to incorrectly calling update_refcount() routine.
6.2 Medium
CVSS3