Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-4467

Опубликовано: 02 июл. 2024
Источник: redhat
CVSS3: 7.8
EPSS Низкий

Описание

A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a json:{} value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file.

Отчет

The impact of this vulnerability in OpenShift Virtualization is downgraded to Low due to the restrictions of the container environment it runs within. As a restricted user within the context of a restricted container, the external files that could be read or written to would already be accessible by an attacker and limited to within the container. CDI additionally uses memory and CPU limits to prevent uncontrolled resource consumption that could otherwise lead to a denial of service.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10qemu-kvmAffected
Red Hat Enterprise Linux 6qemu-kvmNot affected
Red Hat Enterprise Linux 7qemu-kvmNot affected
Red Hat Enterprise Linux 7qemu-kvm-maNot affected
Red Hat Enterprise Linux 8 Advanced Virtualizationvirt:av/qemu-kvmAffected
Red Hat OpenShift Virtualization 4container-native-virtualization/virt-cdi-operator-rhel9Fix deferred
Advanced Virtualization for RHEL 8.2.1virtFixedRHSA-2024:472723.07.2024
Advanced Virtualization for RHEL 8.4.0.EUSvirtFixedRHSA-2024:472423.07.2024
Advanced Virtualization for RHEL 8.4.0.EUSvirt-develFixedRHSA-2024:472423.07.2024
Red Hat Enterprise Linux 8virt-develFixedRHSA-2024:442009.07.2024

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-20->CWE-200
Дефект:
CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=2278875qemu-kvm: 'qemu-img info' leads to host file read/write

EPSS

Процентиль: 22%
0.00069
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
12 месяцев назад

A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file.

CVSS3: 7.8
nvd
12 месяцев назад

A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file.

CVSS3: 7.8
msrc
около 2 месяцев назад

Описание отсутствует

CVSS3: 7.8
debian
12 месяцев назад

A flaw was found in the QEMU disk image utility (qemu-img) 'info' comm ...

suse-cvrf
9 месяцев назад

Security update for qemu

EPSS

Процентиль: 22%
0.00069
Низкий

7.8 High

CVSS3