A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file.
Metrics
Affected Vendors & Products
References
History
Fri, 22 Nov 2024 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 12 Nov 2024 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Metrics |
ssvc
|
Fri, 23 Aug 2024 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 13 Aug 2024 10:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | Qemu: 'qemu-img info' leads to host file read/write | Qemu-kvm: 'qemu-img info' leads to host file read/write |
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2024-07-02T15:57:23.648Z
Updated: 2024-11-13T14:26:07.158Z
Reserved: 2024-05-03T09:44:14.000Z
Link: CVE-2024-4467
Vulnrichment
Updated: 2024-08-22T18:03:16.787Z
NVD
Status : Awaiting Analysis
Published: 2024-07-02T16:15:05.423
Modified: 2024-11-21T09:42:52.947
Link: CVE-2024-4467
Redhat