CVE-2018-10908Improper Input Validation in Vdsm

Severity
6.3MEDIUMNVD
CNA6.5
EPSS
0.3%
top 44.89%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 9
Latest updateMay 13

Description

It was found that vdsm before version 4.20.37 invokes qemu-img on untrusted inputs without limiting resources. By uploading a specially crafted image, an attacker could cause the qemu-img process to consume unbounded amounts of memory of CPU time, causing a denial of service condition that could potentially impact other users of the host.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:HExploitability: 1.8 | Impact: 4.0

Affected Packages2 packages

NVDovirt/vdsm< 4.20.37

Patches

🔴Vulnerability Details

2
GHSA
GHSA-c34h-7mjf-54vf: It was found that vdsm before version 42022-05-13
CVEList
CVE-2018-10908: It was found that vdsm before version 42018-08-09

📋Vendor Advisories

1
Red Hat
vdsm: calls to qemu-img are not protected by prlimit/ulimit2018-08-08

💬Community

1
Bugzilla
CVE-2018-10908 vdsm: calls to qemu-img are not protected by prlimit/ulimit2018-07-20
CVE-2018-10908 — Improper Input Validation in Vdsm | cvebase