A denial of service flaw was found in the way QEMU handled malformed Physical Region Descriptor Table (PRDT) data sent to the host's IDE and/or AHCI controller emulation. A privileged guest user could use this flaw to crash the system.
Find out more about CVE-2014-9718 from the MITRE CVE dictionary dictionary and NIST NVD.
This issue did not affect the versions of the kvm package as shipped with Red Hat Enterprise Linux 5 and the versions of the qemu-kvm packages as shipped with Red Hat Enterprise Linux 6.
This issue affects the version of the qemu-kvm package as shipped with Red Hat Enterprise Linux 7, a future update may address this flaw.
NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.
Base Score | 4.6 |
---|---|
Base Metrics | AV:A/AC:H/Au:N/C:N/I:N/A:C |
Access Vector | Adjacent Network |
Access Complexity | High |
Authentication | None |
Confidentiality Impact | None |
Integrity Impact | None |
Availability Impact | Complete |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Package | State |
---|---|---|
Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7 | qemu-kvm-rhev | Will not fix |
Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) | qemu-kvm-rhev | Will not fix |
Red Hat Enterprise Linux OpenStack Platform 4.0 | qemu-kvm-rhev | Not affected |
Red Hat Enterprise Linux 7 | qemu-kvm-rhev | Will not fix |
Red Hat Enterprise Linux 7 | qemu-kvm | Will not fix |
Red Hat Enterprise Linux 6 | qemu-kvm | Not affected |
Red Hat Enterprise Linux 5 | kvm | Not affected |