Total vulnerabilities in the database
Qemu before 1.6.2 block diver for the various disk image formats used by Bochs and for the QCOW version 2 format, are vulnerable to a possible crash caused by signed data types or a logic error while creating QCOW2 snapshots, which leads to incorrectly calling update_refcount() routine.
Software | From | Fixed in |
---|---|---|
qemu / qemu | - | 1.6.2 |
fedoraproject / fedora | 20 | 20.x |
redhat / enterprise_linux_server_aus | 6.5 | 6.5.x |
redhat / enterprise_linux_server_tus | 6.5 | 6.5.x |
redhat / enterprise_linux_desktop | 6.0 | 6.0.x |
redhat / enterprise_linux_server | 6.0 | 6.0.x |
redhat / enterprise_linux_workstation | 6.0 | 6.0.x |
redhat / virtualization | 3.0 | 3.0.x |
redhat / enterprise_linux_eus | 6.5 | 6.5.x |
redhat / enterprise_linux_openstack_platform | 5 | 5.x |