A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file.
The product does not properly control the allocation and maintenance of a limited resource.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2024:4276 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:4277 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:4278 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:4372 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:4373 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:4374 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:4420 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:4724 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:4727 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2024-4467 | vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2278875 | issue tracking |
http://www.openwall.com/lists/oss-security/2024/07/23/2 | |
https://security.netapp.com/advisory/ntap-20240822-0005/ |