Severity
7.5HIGHNVD
EPSS
1.0%
top 22.94%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 4
Latest updateMay 13

Description

Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages3 packages

Debianqemu/qemu< 2.0.0+dfsg-6+3
NVDqemu/qemu1.7.1+66

Patches

🔴Vulnerability Details

3
GHSA
GHSA-h9pv-ghfm-7x9c: Integer overflow in the qcow_open function in block/qcow2022-05-13
OSV
CVE-2014-0222: Integer overflow in the qcow_open function in block/qcow2014-11-04
CVEList
CVE-2014-0222: Integer overflow in the qcow_open function in block/qcow2014-11-04

📋Vendor Advisories

3
Ubuntu
QEMU vulnerabilities2014-09-08
Red Hat
Qemu: qcow1: validate L2 table size to avoid integer overflows2014-05-12
Debian
CVE-2014-0222: qemu - Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 ...2014

💬Community

2
Bugzilla
CVE-2014-0222 Qemu: qcow1: validate L2 table size to avoid integer overflows2014-05-13
Bugzilla
CVE-2014-0222 Qemu: qcow1: validate L2 table size to avoid integer overflows [fedora-all]2014-05-13
CVE-2014-0222 — Integer Overflow or Wraparound in Qemu | cvebase