First published: Fri May 03 2024(Updated: )
A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service, or read/write to an existing external file.
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2278875 is classified as a denial of service vulnerability due to resource exhaustion.
To fix REDHAT-BUG-2278875, upgrade to the latest version of QEMU containing the necessary patches.
REDHAT-BUG-2278875 affects the QEMU disk image utility known as qemu-img.
REDHAT-BUG-2278875 enables denial of service attacks by causing excessive memory or CPU consumption.
The command related to REDHAT-BUG-2278875 is the 'info' command in the qemu-img utility.