A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file.

Project Subscriptions

Vendors Products
Advanced Virtualization Subscribe
Container Native Virtualization Subscribe
Enterprise Linux Subscribe
Rhel Aus Subscribe
Rhel E4s Subscribe
Rhel Eus Subscribe
Rhel Tus Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2024-44082 A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file.
Ubuntu USN Ubuntu USN USN-7744-1 QEMU vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00075}

epss

{'score': 0.00058}


Wed, 21 May 2025 01:15:00 +0000

Type Values Removed Values Added
CPEs cpe:/o:redhat:enterprise_linux:10

Fri, 22 Nov 2024 12:00:00 +0000


Tue, 12 Nov 2024 10:15:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 23 Aug 2024 20:30:00 +0000

Type Values Removed Values Added
References

Tue, 13 Aug 2024 10:45:00 +0000

Type Values Removed Values Added
Title Qemu: 'qemu-img info' leads to host file read/write Qemu-kvm: 'qemu-img info' leads to host file read/write

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-11-08T04:04:40.701Z

Reserved: 2024-05-03T09:44:14.000Z

Link: CVE-2024-4467

cve-icon Vulnrichment

Updated: 2024-08-22T18:03:16.787Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-07-02T16:15:05.423

Modified: 2024-11-21T09:42:52.947

Link: CVE-2024-4467

cve-icon Redhat

Severity : Important

Publid Date: 2024-07-02T15:00:00Z

Links: CVE-2024-4467 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses