First published: Wed Mar 19 2014(Updated: )
Qemu block driver for the QCOW version 2 format is vulnerable to a NULL pointer dereference flaw. It could occur in case of an error in reading a qcow2 image file, after the 'snapshot_offset' & 'nb_snapshots' fields have been initialised. An user able to alter the Qemu disk image could use this flaw to crash the Qemu instance resulting in Dos. Upstream fix: ------------- qcow2: Fix NULL dereference in qcow2_open() error path -> <a href="http://git.qemu.org/?p=qemu.git;a=commit;h=11b128f4062dd7f89b14abc8877ff20d41b28be9">http://git.qemu.org/?p=qemu.git;a=commit;h=11b128f4062dd7f89b14abc8877ff20d41b28be9</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=1.7.1 | |
QEMU KVM | =2.0.0-rc0 | |
QEMU KVM | =2.0.0-rc1 | |
QEMU KVM | =2.0.0-rc2 | |
QEMU KVM | =2.0.0-rc3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0146 is considered a critical vulnerability due to its impact on the Qemu block driver for QCOW version 2 format.
To fix CVE-2014-0146, you should upgrade your QEMU installation to a version later than 1.7.1 or any of the 2.0.0 release candidates.
CVE-2014-0146 affects users of QEMU specifically in the versions up to and including 1.7.1 and the 2.0.0 release candidates.
Systems running vulnerable versions of QEMU KVM are at risk of exploitation from malicious disk images.
CVE-2014-0146 identifies a NULL pointer dereference flaw occurring during the reading of qcow2 image files.