First published: Thu Mar 20 2014(Updated: )
Qemu before 1.6.2 block diver for the various disk image formats used by Bochs and for the QCOW version 2 format, are vulnerable to a possible crash caused by signed data types or a logic error while creating QCOW2 snapshots, which leads to incorrectly calling update_refcount() routine.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <1.6.2 | |
Fedoraproject Fedora | =20 | |
Redhat Virtualization | =3.0 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Eus | =6.5 | |
Redhat Enterprise Linux Openstack Platform | =5 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =6.5 | |
Red Hat Enterprise Linux Server | =6.5 | |
Redhat Enterprise Linux Workstation | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0147 is a vulnerability in Qemu which allows for a possible crash caused by signed data types or a logic error while creating QCOW2 snapshots.
Qemu versions before 1.6.2, Fedoraproject Fedora 20, Redhat Virtualization 3.0, Redhat Enterprise Linux Desktop 6.0, Redhat Enterprise Linux Eus 6.5, Redhat Enterprise Linux Openstack Platform 5, Redhat Enterprise Linux Server 6.0, Redhat Enterprise Linux Server Aus 6.5, and Redhat Enterprise Linux Server Tus 6.5 are affected by CVE-2014-0147.
CVE-2014-0147 has a severity level of medium with a CVSS score of 6.2.
Update your Qemu software to version 1.6.2 or later to fix CVE-2014-0147.
You can find more information about CVE-2014-0147 at the following links: [link1], [link2], [link3].