CVE-2024-4467

A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
redhatCNA
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA-ADPADP
---
---
CVEADP
---
---
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 8%
Debian logo
Debian Releases
Debian Product
Codename
qemu
bullseye
ignored
bullseye (security)
vulnerable
bookworm
1:7.2+dfsg-7+deb12u13
fixed
bookworm (security)
1:7.2+dfsg-7+deb12u15
fixed
trixie
1:10.0.2+ds-2
fixed
trixie (security)
1:10.0.2+ds-2+deb13u1
fixed
forky
1:10.0.3+ds-4
fixed
sid
1:10.1.0+ds-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
qemu
plucky
Fixed 1:9.0.2+ds-4ubuntu2
released
oracular
Fixed 1:9.0.2+ds-4ubuntu2
released
noble
needed
mantic
ignored
jammy
needed
focal
needs-triage
bionic
needs-triage
xenial
needs-triage
trusty
needs-triage