Description
Qemu before 2.0 block driver for Hyper-V VHDX Images is vulnerable to infinite loops and other potential issues when calculating BAT entries, due to missing bounds checks for block_size and logical_sector_size variables. These are used to derive other fields like 'sectors_per_block' etc. A user able to alter the Qemu disk image could ise this flaw to crash the Qemu instance resulting in DoS.
References (6)
Core 6
Core References
Patch x_refsource_misc
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=1d7678dec4761acdc43439da6ceda41a703ba1a6
Third Party Advisory x_refsource_misc
http://rhn.redhat.com/errata/RHSA-2014-0420.html
Third Party Advisory x_refsource_misc
http://rhn.redhat.com/errata/RHSA-2014-0421.html
Mailing List, Patch, Third Party Advisory x_refsource_misc
http://www.openwall.com/lists/oss-security/2014/03/26/8
Issue Tracking, Patch, Third Party Advisory x_refsource_misc
https://bugzilla.redhat.com/show_bug.cgi?id=1078212
Mailing List, Patch, Third Party Advisory x_refsource_misc
https://lists.gnu.org/archive/html/qemu-devel/2014-03/msg04994.html
Scores
CVSS v3
5.5
EPSS
0.0012
EPSS Percentile
30.2%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-835
Status
published
Products (9)
qemu/qemu
< 2.0.0
redhat/enterprise_linux_desktop
6.0
redhat/enterprise_linux_eus
6.5
redhat/enterprise_linux_openstack_platform
5
redhat/enterprise_linux_server
6.0
redhat/enterprise_linux_server_aus
6.5
redhat/enterprise_linux_server_tus
6.5
redhat/enterprise_linux_workstation
6.0
redhat/virtualization
3.0
Published
Sep 29, 2022
Tracked Since
Feb 18, 2026