QEMU before 2.0.0 block drivers for CLOOP, QCOW2 version 2 and various other image formats are vulnerable to potential memory corruptions, integer/buffer overflows or crash caused by missing input validations which could allow a remote user to execute arbitrary code on the host with the privileges of the QEMU process.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 02:01
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=24342f2cae47d03911e346fe1e520b00dc2818e0 - | |
References | () http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=2d51c32c4b511db8bb9e58208f1e2c25e4c06c85 - | |
References | () http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=5dab2faddc8eaa1fb1abdbe2f502001fc13a1b21 - | |
References | () http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=63fa06dc978f3669dbfd9443b33cde9e2a7f4b41 - | |
References | () http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=6d4b9e55fc625514a38d27cff4b9933f617fa7dc - | |
References | () http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=7b103b36d6ef3b11827c203d3a793bf7da50ecd6 - | |
References | () http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=97f1c45c6f456572e5b504b8614e4a69e23b8e3a - | |
References | () http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=a1b3955c9415b1e767c130a2f59fee6aa28e575b - | |
References | () http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=ce48f2f441ca98885267af6fd636a7cb804ee646 - | |
References | () http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=d65f97a82c4ed48374a764c769d4ba1ea9724e97 - | |
References | () http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=f56b9bc3ae20fc93815b34aa022be919941406ce - | |
References | () http://rhn.redhat.com/errata/RHSA-2014-0420.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2014-0421.html - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1079240 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://www.vulnerabilitycenter.com/#%21vul=44767 - |
Information
Published : 2022-09-29 03:15
Updated : 2024-11-21 02:01
NVD link : CVE-2014-0144
Mitre link : CVE-2014-0144
CVE.ORG link : CVE-2014-0144
JSON object : View
Products Affected
redhat
- enterprise_linux_server
- virtualization
- enterprise_linux_desktop
- enterprise_linux_server_aus
- enterprise_linux_eus
- enterprise_linux_openstack_platform
- enterprise_linux_server_tus
- enterprise_linux_workstation
qemu
- qemu
CWE
CWE-20
Improper Input Validation