Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-4467

Опубликовано: 02 июл. 2024
Источник: redhat
CVSS3: 7.8

Описание

A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a json:{} value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file.

Отчет

The impact of this vulnerability in OpenShift Virtualization is downgraded to Low due to the restrictions of the container environment it runs within. As a restricted user within the context of a restricted container, the external files that could be read or written to would already be accessible by an attacker and limited to within the container. CDI additionally uses memory and CPU limits to prevent uncontrolled resource consumption that could otherwise lead to a denial of service.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10qemu-kvmNot affected
Red Hat Enterprise Linux 6qemu-kvmNot affected
Red Hat Enterprise Linux 7qemu-kvmNot affected
Red Hat Enterprise Linux 7qemu-kvm-maNot affected
Red Hat Enterprise Linux 8 Advanced Virtualizationvirt:av/qemu-kvmAffected
Red Hat OpenShift Virtualization 4container-native-virtualization/virt-cdi-operator-rhel9Fix deferred
Advanced Virtualization for RHEL 8.2.1virtFixedRHSA-2024:472723.07.2024
Advanced Virtualization for RHEL 8.4.0.EUSvirtFixedRHSA-2024:472423.07.2024
Advanced Virtualization for RHEL 8.4.0.EUSvirt-develFixedRHSA-2024:472423.07.2024
Red Hat Enterprise Linux 8virt-develFixedRHSA-2024:442009.07.2024

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=2278875qemu-kvm: 'qemu-img info' leads to host file read/write

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 1 года назад

A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file.

CVSS3: 7.8
nvd
больше 1 года назад

A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file.

CVSS3: 7.8
msrc
11 месяцев назад

Qemu-kvm: 'qemu-img info' leads to host file read/write

CVSS3: 7.8
debian
больше 1 года назад

A flaw was found in the QEMU disk image utility (qemu-img) 'info' comm ...

suse-cvrf
больше 1 года назад

Security update for qemu

7.8 High

CVSS3