QEMU qemu-img Vulnerability: Memory or CPU Consumption Denial of Service
CVE-2024-4467
7.8HIGH
Key Information
- Vendor
- Red Hat
- Status
- Advanced Virtualization For Rhel 8.2.1
- Advanced Virtualization For Rhel 8.4.0.eus
- Red Hat Enterprise Linux 8
- Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
- Vendor
- CVE Published:
- 2 July 2024
Summary
A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file.
Affected Version(s)
Advanced Virtualization for RHEL 8.2.1 <= 8020120240708124623.863bb0db
Advanced Virtualization for RHEL 8.4.0.EUS <= 8040020240708093550.522a0ee4
Advanced Virtualization for RHEL 8.4.0.EUS <= 8040020240708093550.522a0ee4
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Risk change from: null to: 7.8 - (HIGH)
Vulnerability published.
Reported to Red Hat.
Collectors
NVD DatabaseMitre Database
Credit
Red Hat would like to thank Martin Kaesberger for reporting this issue.