ALT-PU-2024-11120-2
Closed vulnerabilities
Published: 2024-07-02
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2024-4467
A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file.
Severity: HIGH (7.8)
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
References:
- https://access.redhat.com/errata/RHSA-2024:4276
- https://access.redhat.com/errata/RHSA-2024:4277
- https://access.redhat.com/errata/RHSA-2024:4278
- https://access.redhat.com/errata/RHSA-2024:4372
- https://access.redhat.com/errata/RHSA-2024:4373
- https://access.redhat.com/errata/RHSA-2024:4374
- https://access.redhat.com/errata/RHSA-2024:4420
- https://access.redhat.com/errata/RHSA-2024:4724
- https://access.redhat.com/errata/RHSA-2024:4727
- https://access.redhat.com/security/cve/CVE-2024-4467
- https://bugzilla.redhat.com/show_bug.cgi?id=2278875
- http://www.openwall.com/lists/oss-security/2024/07/23/2
- https://access.redhat.com/errata/RHSA-2024:4276
- https://access.redhat.com/errata/RHSA-2024:4277
- https://access.redhat.com/errata/RHSA-2024:4278
- https://access.redhat.com/errata/RHSA-2024:4372
- https://access.redhat.com/errata/RHSA-2024:4373
- https://access.redhat.com/errata/RHSA-2024:4374
- https://access.redhat.com/errata/RHSA-2024:4420
- https://access.redhat.com/errata/RHSA-2024:4724
- https://access.redhat.com/errata/RHSA-2024:4727
- https://access.redhat.com/security/cve/CVE-2024-4467
- https://bugzilla.redhat.com/show_bug.cgi?id=2278875
- https://security.netapp.com/advisory/ntap-20240822-0005/
Closed bugs
/lib/udev/rules.d/90-qemu-guest-agent.rules содержит синтаксические ошибки