Lucene search
Basic search
Lucene search
Search by product
Subscribe
K
Start 30-day trial
Database
Vendors
Products
Years
CVSS
Scanner
Agent Scanning
API Scanning
Manual Audit
Perimeter Scanner
Scanning
Projects
Email
Webhook
Plugins
Resources
Documents
Blog
Glossary
FAQ
Pricing
Contacts
About Us
Partners
Branding Guideline
SIGN IN
Oracle
ELSA-2014-0420
History
Apr 22, 2014 - 12:00 a.m.
Vulners
/
Oraclelinux
/
qemu-kvm security update
qemu-kvm security update
2014-04-22
00:00:00
Oracle
linux.oracle.com
32
EPSS
0.021
Percentile
89.2%
JSON
[0.12.1.2-2.415.el6_5.8]
kvm-virtio-net-fix-guest-triggerable-buffer-overrun.patch [bz#1078605 bz#1078849]
kvm-qcow2-Check-backing_file_offset-CVE-2014-0144.patch [bz#1079452 bz#1079453]
kvm-qcow2-Check-refcount-table-size-CVE-2014-0144.patch [bz#1079452 bz#1079453]
kvm-qcow2-Validate-refcount-table-offset.patch [bz#1079518 bz#1086678]
kvm-qcow2-Validate-snapshot-table-offset-size-CVE-2014-0.patch [bz#1079452 bz#1079453]
kvm-qcow2-Validate-active-L1-table-offset-and-size-CVE-2.patch [bz#1079452 bz#1079453]
kvm-qcow2-Fix-backing-file-name-length-check.patch [bz#1079518 bz#1086678]
kvm-qcow2-Don-t-rely-on-free_cluster_index-in-alloc_refc.patch [bz#1079337 bz#1079338]
kvm-qcow2-Avoid-integer-overflow-in-get_refcount-CVE-201.patch [bz#1079318 bz#1079319]
kvm-qcow2-Check-new-refcount-table-size-on-growth.patch [bz#1079518 bz#1086678]
kvm-qcow2-Fix-types-in-qcow2_alloc_clusters-and-alloc_cl.patch [bz#1079518 bz#1086678]
kvm-qcow2-Protect-against-some-integer-overflows-in-bdrv.patch [bz#1079518 bz#1086678]
kvm-qcow2-Catch-some-L1-table-index-overflows.patch [bz#1079518 bz#1086678]
kvm-qcow2-Fix-new-L1-table-size-check-CVE-2014-0143.patch [bz#1079318 bz#1079319]
kvm-qcow2-Fix-NULL-dereference-in-qcow2_open-error-path-.patch [bz#1079330 bz#1079331]
kvm-qcow2-Limit-snapshot-table-size.patch [bz#1079518 bz#1086678]
kvm-block-cloop-validate-block_size-header-field-CVE-201.patch [bz#1079452 bz#1079453]
kvm-block-cloop-prevent-offsets_size-integer-overflow-CV.patch [bz#1079318 bz#1079319]
kvm-block-cloop-refuse-images-with-huge-offsets-arrays-C.patch [bz#1079452 bz#1079453]
kvm-block-cloop-Fix-coding-style.patch [bz#1079518 bz#1086678]
kvm-cloop-Fix-bdrv_open-error-handling.patch [bz#1079518 bz#1086678]
kvm-block-cloop-refuse-images-with-bogus-offsets-CVE-201.patch [bz#1079452 bz#1079453]
kvm-block-cloop-Use-g_free-instead-of-free.patch [bz#1079518 bz#1086678]
kvm-block-cloop-fix-offsets-size-off-by-one.patch [bz#1079518 bz#1086678]
kvm-bochs-Fix-bdrv_open-error-handling.patch [bz#1079518 bz#1086678]
kvm-bochs-Unify-header-structs-and-make-them-QEMU_PACKED.patch [bz#1079518 bz#1086678]
kvm-bochs-Use-unsigned-variables-for-offsets-and-sizes-C.patch [bz#1079337 bz#1079338]
kvm-bochs-Check-catalog_size-header-field-CVE-2014-0143.patch [bz#1079318 bz#1079319]
kvm-bochs-Check-extent_size-header-field-CVE-2014-0142.patch [bz#1079313 bz#1079314]
kvm-bochs-Fix-bitmap-offset-calculation.patch [bz#1079518 bz#1086678]
kvm-vpc-vhd-add-bounds-check-for-max_table_entries-and-b.patch [bz#1079452 bz#1079453]
kvm-vpc-Validate-block-size-CVE-2014-0142.patch [bz#1079313 bz#1079314]
kvm-vdi-add-bounds-checks-for-blocks_in_image-and-disk_s.patch [bz#1079452 bz#1079453]
kvm-vhdx-Bounds-checking-for-block_size-and-logical_sect.patch [bz#1079343 bz#1079344]
kvm-curl-check-data-size-before-memcpy-to-local-buffer.-.patch [bz#1079452 bz#1079453]
kvm-dmg-Fix-bdrv_open-error-handling.patch [bz#1079518 bz#1086678]
kvm-dmg-coding-style-and-indentation-cleanup.patch [bz#1079518 bz#1086678]
kvm-dmg-prevent-out-of-bounds-array-access-on-terminator.patch [bz#1079518 bz#1086678]
kvm-dmg-drop-broken-bdrv_pread-loop.patch [bz#1079518 bz#1086678]
kvm-dmg-use-appropriate-types-when-reading-chunks.patch [bz#1079518 bz#1086678]
kvm-dmg-sanitize-chunk-length-and-sectorcount-CVE-2014-0.patch [bz#1079323 bz#1079324]
kvm-dmg-use-uint64_t-consistently-for-sectors-and-length.patch [bz#1079518 bz#1086678]
kvm-dmg-prevent-chunk-buffer-overflow-CVE-2014-0145.patch [bz#1079323 bz#1079324]
kvm-block-Limit-request-size-CVE-2014-0143.patch [bz#1079318 bz#1079319]
kvm-parallels-Fix-catalog-size-integer-overflow-CVE-2014.patch [bz#1079318 bz#1079319]
kvm-parallels-Sanity-check-for-s-tracks-CVE-2014-0142.patch [bz#1079313 bz#1079314]
kvm-bochs-Fix-memory-leak-in-bochs_open-error-path.patch [bz#1079518 bz#1086678]
kvm-bochs-Fix-catalog-size-check.patch [bz#1079518 bz#1086678]
Resolves: bz#1078849
(EMBARGOED CVE-2014-0150 qemu-kvm: qemu: virtio-net: buffer overflow in virtio_net_handle_mac() function [rhel-6.5.z])
Resolves: bz#1079313
(CVE-2014-0142 qemu-kvm: qemu: crash by possible division by zero [rhel-6.5.z])
Resolves: bz#1079318
(CVE-2014-0143 qemu-kvm: Qemu: block: multiple integer overflow flaws [rhel-6.5.z])
Resolves: bz#1079323
(CVE-2014-0145 qemu-kvm: Qemu: prevent possible buffer overflows [rhel-6.5.z])
Resolves: bz#1079330
(CVE-2014-0146 qemu-kvm: Qemu: qcow2: NULL dereference in qcow2_open() error path [rhel-6.5.z])
Resolves: bz#1079337
(CVE-2014-0147 qemu-kvm: Qemu: block: possible crash due signed types or logic error [rhel-6.5.z])
Resolves: bz#1079343
(CVE-2014-0148 qemu-kvm: Qemu: vhdx: bounds checking for block_size and logical_sector_size [rhel-6.5.z])
Resolves: bz#1079452
(CVE-2014-0144 qemu-kvm: Qemu: block: missing input validation [rhel-6.5.z])
Resolves: bz#1086678
(qemu-kvm: include leftover patches from block layer security audit)
Related
redhat 5
openvas 52
nessus 22
centos 1
veracode 8
fedora 30
suse 1
debian 6
securityvulns 4
gentoo 1
ubuntucve 8
debiancve 8
nvd 8
cvelist 8
prion 8
cve 8
osv 3
seebug 3
mageia 1
ubuntu 2
redhat
redhat
5
(RHSA-2014:0421) Moderate: qemu-kvm-rhev security update
2014-04-22 00:00:00
(RHSA-2014:0435) Moderate: qemu-kvm-rhev security update
2014-04-24 00:00:00
(RHSA-2014:0434) Moderate: qemu-kvm-rhev security update
2014-04-24 00:00:00
openvas
openvas
52
RedHat Update for qemu-kvm RHSA-2014:0420-01
2014-05-02 00:00:00
CentOS Update for qemu-guest-agent CESA-2014:0420 centos6
2014-05-02 00:00:00
RedHat Update for qemu-kvm RHSA-2014:0420-01
2014-05-02 00:00:00
nessus
nessus
22
CentOS 6 : qemu-kvm (CESA-2014:0420)
2014-04-23 00:00:00
Scientific Linux Security Update : qemu-kvm on SL6.x i386/x86_64 (20140422)
2014-04-23 00:00:00
RHEL 6 : qemu-kvm (RHSA-2014:0420)
2014-04-23 00:00:00
centos
centos
qemu security update
2014-04-22 19:33:34
veracode
veracode
8
Heap-Based Buffer Overflow
2019-05-02 04:57:36
Denial Of Service (DoS)
2019-05-02 04:57:36
Denial Of Service (DoS)
2019-05-02 04:57:36
fedora
fedora
30
[SECURITY] Fedora 20 Update: qemu-1.6.2-4.fc20
2014-05-01 22:27:28
[SECURITY] Fedora 20 Update: qemu-1.6.2-6.fc20
2014-06-10 02:56:05
[SECURITY] Fedora 20 Update: qemu-1.6.2-8.fc20
2014-09-11 00:54:50
suse
suse
Security update for kvm (important)
2014-05-08 19:04:16
debian
debian
6
[SECURITY] [DSA 3044-1] qemu-kvm security update
2014-10-04 19:26:54
[SECURITY] [DSA 3045-1] qemu security update
2014-10-04 19:27:38
[SECURITY] [DSA 2909-1] qemu security update
2014-04-18 06:35:56
securityvulns
securityvulns
4
[SECURITY] [DSA 3045-1] qemu security update
2014-10-13 00:00:00
qemu multiple security vulnerabilities
2014-12-08 00:00:00
[USN-2182-1] QEMU vulnerabilities
2014-05-04 00:00:00
gentoo
gentoo
QEMU: Multiple vulnerabilities
2014-08-30 00:00:00
ubuntucve
ubuntucve
8
CVE-2014-0142
2014-03-26 00:00:00
CVE-2014-0148
2022-09-29 00:00:00
CVE-2014-0150
2014-04-18 00:00:00
debiancve
debiancve
8
CVE-2014-0142
2017-08-10 15:29:00
CVE-2014-0148
2022-09-29 03:15:11
CVE-2014-0150
2014-04-18 14:55:25
nvd
nvd
8
CVE-2014-0142
2017-08-10 15:29:00
CVE-2014-0148
2022-09-29 03:15:11
CVE-2014-0150
2014-04-18 14:55:25
cvelist
cvelist
8
CVE-2014-0142
2017-08-10 15:00:00
CVE-2014-0150
2014-04-18 14:00:00
CVE-2014-0148
2020-02-11 03:43:19
prion
prion
8
Denial of service
2017-08-10 15:29:00
Out-of-bounds
2022-09-29 03:15:00
Integer overflow
2014-04-18 14:55:00
cve
cve
8
CVE-2014-0142
2017-08-10 15:29:00
CVE-2014-0148
2022-09-29 03:15:11
CVE-2014-0143
2017-08-10 15:29:00
osv
osv
qemu - security update
2014-04-18 00:00:00
qemu-kvm - security update
2014-04-18 00:00:00
qemu-2.6.1-1.5 on GA media
2024-06-15 00:00:00
seebug
seebug
Qemu virtio-net "virtio_net_handle_mac()"整数溢出漏洞
2014-04-18 00:00:00
QEMU 多个缓冲区溢出漏洞
2014-03-31 00:00:00
QEMU多个本地拒绝服务漏洞
2014-03-31 00:00:00
mageia
mageia
Updated qemu packages fix multiple security vulnerabilities
2014-10-28 14:33:36
ubuntu
ubuntu
QEMU vulnerabilities
2014-09-08 00:00:00
QEMU vulnerabilities
2014-04-28 00:00:00
EPSS
0.021
Percentile
89.2%
JSON
Related for ELSA-2014-0420
redhat
5
openvas
52
nessus
22
centos
1
veracode
8
fedora
30
suse
1
debian
6
securityvulns
4
gentoo
1
ubuntucve
8
debiancve
8
nvd
8
cvelist
8
prion
8
cve
8
osv
3
seebug
3
mageia
1
ubuntu
2