First published: Thu Aug 09 2018(Updated: )
It was found that vdsm before version 4.20.37 invokes qemu-img on untrusted inputs without limiting resources. By uploading a specially crafted image, an attacker could cause the qemu-img process to consume unbounded amounts of memory of CPU time, causing a denial of service condition that could potentially impact other users of the host.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ovirt Vdsm | <4.20.37 | |
Redhat Virtualization | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-10908 is high with a CVSS score of 6.3.
Ovirt Vdsm before version 4.20.37 and Redhat Virtualization 4.0 are affected by CVE-2018-10908.
CVE-2018-10908 can cause a denial of service condition by consuming excessive memory or CPU time.
Yes, the fix for CVE-2018-10908 is included in vdsm version 4.20.37 and above.
You can find more information about CVE-2018-10908 at the following references: http://lists.nongnu.org/archive/html/qemu-block/2018-07/msg00488.html, https://access.redhat.com/errata/RHEA-2018:2624, and https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10908.