{"id":"CVE-2024-4467","details":"A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file.","modified":"2026-04-16T04:31:04.888230254Z","published":"2024-07-02T16:15:05Z","related":["ALSA-2024:4278","ALSA-2024:4420","SUSE-SU-2024:2977-1","SUSE-SU-2024:2983-1","SUSE-SU-2024:3077-1","SUSE-SU-2024:3396-1","SUSE-SU-2025:20036-1","openSUSE-SU-2024:14411-1"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:4276"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:4277"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:4278"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:4372"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:4373"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:4374"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:4420"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:4724"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:4727"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20240822-0005/"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278875"},{"type":"WEB","url":"https://access.redhat.com/security/cve/CVE-2024-4467"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/07/23/2"}],"schema_version":"1.7.5"}