First published: Fri May 03 2024(Updated: )
A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4467 has a high severity due to its potential to cause denial of service through excessive resource consumption.
To fix CVE-2024-4467, update the QEMU software to the latest version that addresses this vulnerability.
CVE-2024-4467 affects the QEMU disk image utility, particularly the qemu-img command.
CVE-2024-4467 is associated with denial of service attacks through crafted image files.
CVE-2024-4467 may be exploited remotely if an attacker can provide a malicious image file to the qemu-img process.