CVE-2014-0147

CWE-190Integer Overflow9 documents8 sources
Severity
6.2MEDIUM
EPSS
0.1%
top 68.96%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 29
Latest updateSep 30

Description

Qemu before 1.6.2 block diver for the various disk image formats used by Bochs and for the QCOW version 2 format, are vulnerable to a possible crash caused by signed data types or a logic error while creating QCOW2 snapshots, which leads to incorrectly calling update_refcount() routine.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 2.5 | Impact: 3.6

Affected Packages8 packages

NVDqemu/qemu< 1.6.2
Debianqemu< 2.0.0+dfsg-1+3
CVEListV5qemubefore 1.6.2

Also affects: Fedora 20, Enterprise Linux 6.5

Patches

🔴Vulnerability Details

3
GHSA
GHSA-gx9j-r5m2-p97g: Qemu before 12022-09-30
OSV
CVE-2014-0147: Qemu before 12022-09-29
CVEList
CVE-2014-0147: Qemu before 12020-02-11

📋Vendor Advisories

3
Ubuntu
QEMU vulnerabilities2014-09-08
Red Hat
Qemu: block: possible crash due signed types or logic error2014-03-26
Debian
CVE-2014-0147: qemu - Qemu before 1.6.2 block diver for the various disk image formats used by Bochs a...2014

💬Community

2
Bugzilla
CVE-2014-0147 Qemu: block: possible crash due signed types or logic error [fedora-all]2014-04-11
Bugzilla
CVE-2014-0147 Qemu: block: possible crash due signed types or logic error2014-03-20