A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file.
History

Fri, 23 Aug 2024 20:30:00 +0000

Type Values Removed Values Added
References

Tue, 13 Aug 2024 10:45:00 +0000

Type Values Removed Values Added
Title Qemu: 'qemu-img info' leads to host file read/write Qemu-kvm: 'qemu-img info' leads to host file read/write

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2024-07-02T15:57:23.648Z

Updated: 2024-09-13T21:21:48.447Z

Reserved: 2024-05-03T09:44:14.000Z

Link: CVE-2024-4467

cve-icon Vulnrichment

Updated: 2024-08-22T18:03:16.787Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-07-02T16:15:05.423

Modified: 2024-09-13T22:15:02.260

Link: CVE-2024-4467

cve-icon Redhat

Severity : Important

Publid Date: 2024-07-02T15:00:00Z

Links: CVE-2024-4467 - Bugzilla