MEDIUM · 6.2

CVE-2014-0147

Qemu before 1.6.2 block diver for the various disk image formats used by Bochs and for the QCOW version 2 format, are vulnerable to a possible crash caused by signed data types or a logic error while ...

Vulnerability Description

Qemu before 1.6.2 block diver for the various disk image formats used by Bochs and for the QCOW version 2 format, are vulnerable to a possible crash caused by signed data types or a logic error while creating QCOW2 snapshots, which leads to incorrectly calling update_refcount() routine.

CVSS Score

6.2

MEDIUM

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
QemuQemu< 1.6.2
FedoraprojectFedora20
RedhatVirtualization3.0
RedhatEnterprise Linux Desktop6.0
RedhatEnterprise Linux Eus6.5
RedhatEnterprise Linux Openstack Platform5
RedhatEnterprise Linux Server6.0
RedhatEnterprise Linux Server Aus6.5
RedhatEnterprise Linux Server Tus6.5
RedhatEnterprise Linux Workstation6.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2014-0147?

CVE-2014-0147 is a vulnerability with a CVSS score of 6.2 (MEDIUM). Qemu before 1.6.2 block diver for the various disk image formats used by Bochs and for the QCOW version 2 format, are vulnerable to a possible crash caused by signed data types or a logic error while ...

How severe is CVE-2014-0147?

CVE-2014-0147 has been rated MEDIUM with a CVSS base score of 6.2/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2014-0147?

Check the references section above for vendor advisories and patch information. Affected products include: Qemu Qemu, Fedoraproject Fedora, Redhat Virtualization, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Eus.