First published: Wed Mar 19 2014(Updated: )
Qemu before 2.0 block driver for Hyper-V VHDX Images is vulnerable to infinite loops and other potential issues when calculating BAT entries, due to missing bounds checks for block_size and logical_sector_size variables. These are used to derive other fields like 'sectors_per_block' etc. A user able to alter the Qemu disk image could ise this flaw to crash the Qemu instance resulting in DoS.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <2.0.0 | |
Red Hat Enterprise Virtualization | =3.0 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server EUS | =6.5 | |
Red Hat OpenStack Platform | =5 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =6.5 | |
Red Hat Enterprise Linux Server | =6.5 | |
Red Hat Enterprise Linux Workstation | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2014-0148 is classified as medium due to the potential for infinite loops and resource exhaustion.
To fix CVE-2014-0148, upgrade QEMU to version 2.0 or later to ensure bounds checks are properly implemented.
CVE-2014-0148 affects QEMU versions before 2.0 and specific versions of Red Hat virtualization products.
CVE-2014-0148 can cause infinite loops and other operational issues in virtualization environments using vulnerable QEMU versions.
CVE-2014-0148 is not classified as critical but still poses a significant risk to affected systems.