A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file.
History

Fri, 22 Nov 2024 12:00:00 +0000


Tue, 12 Nov 2024 10:15:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 23 Aug 2024 20:30:00 +0000

Type Values Removed Values Added
References

Tue, 13 Aug 2024 10:45:00 +0000

Type Values Removed Values Added
Title Qemu: 'qemu-img info' leads to host file read/write Qemu-kvm: 'qemu-img info' leads to host file read/write

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2024-07-02T15:57:23.648Z

Updated: 2024-11-13T14:26:07.158Z

Reserved: 2024-05-03T09:44:14.000Z

Link: CVE-2024-4467

cve-icon Vulnrichment

Updated: 2024-08-22T18:03:16.787Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-07-02T16:15:05.423

Modified: 2024-11-21T09:42:52.947

Link: CVE-2024-4467

cve-icon Redhat

Severity : Important

Publid Date: 2024-07-02T15:00:00Z

Links: CVE-2024-4467 - Bugzilla