CVE-2024-4467
📋 TL;DR
A vulnerability in QEMU's qemu-img utility allows attackers to cause denial of service or potentially read/write to external files by providing a specially crafted disk image with malicious JSON data. This affects systems using qemu-img to inspect disk images, particularly virtualization hosts and cloud infrastructure. The flaw can be triggered by any user who can provide a malicious image file to qemu-img.
💻 Affected Systems
- QEMU
- Red Hat Enterprise Linux
- Fedora
- CentOS Stream
- Other QEMU-based virtualization platforms
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete host system resource exhaustion leading to denial of service, or unauthorized read/write access to existing files on the host filesystem.
Likely Case
Denial of service through excessive memory/CPU consumption when processing malicious disk images.
If Mitigated
Limited impact if qemu-img usage is restricted to trusted users and images from verified sources only.
🎯 Exploit Status
Requires crafting a malicious disk image with specific JSON payload and convincing a user/system to process it with qemu-img info command.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check specific Red Hat advisories for version numbers (RHSA-2024:4276, RHSA-2024:4277, etc.)
Vendor Advisory: https://access.redhat.com/errata/RHSA-2024:4276
Restart Required: No
Instructions:
1. Update QEMU packages using your distribution's package manager. 2. For RHEL: 'yum update qemu-kvm* qemu-img*'. 3. Verify the update completed successfully. 4. No service restart required for qemu-img utility.
🔧 Temporary Workarounds
Restrict qemu-img usage
linuxLimit qemu-img command execution to trusted users only and avoid processing untrusted disk images.
chmod 750 /usr/bin/qemu-img
setfacl -m u:trusteduser:rx /usr/bin/qemu-img
🧯 If You Can't Patch
- Implement strict access controls on qemu-img binary to prevent untrusted users from executing it.
- Only process disk images from verified, trusted sources and implement image validation before qemu-img processing.
🔍 How to Verify
Check if Vulnerable:
Check QEMU version: 'qemu-img --version' and compare against patched versions in Red Hat advisories.
Check Version:
qemu-img --version
Verify Fix Applied:
Verify updated package version: 'rpm -q qemu-img' (RHEL) or 'dpkg -l | grep qemu' (Debian/Ubuntu) and confirm version matches patched release.
📡 Detection & Monitoring
Log Indicators:
- Unusual memory/CPU consumption by qemu-img processes
- Failed qemu-img operations with malformed input errors
Network Indicators:
- Unusual transfers of disk image files to systems running qemu-img
SIEM Query:
process_name:"qemu-img" AND (memory_usage>threshold OR cpu_usage>threshold)
🔗 References
- https://access.redhat.com/errata/RHSA-2024:4276
- https://access.redhat.com/errata/RHSA-2024:4277
- https://access.redhat.com/errata/RHSA-2024:4278
- https://access.redhat.com/errata/RHSA-2024:4372
- https://access.redhat.com/errata/RHSA-2024:4373
- https://access.redhat.com/errata/RHSA-2024:4374
- https://access.redhat.com/errata/RHSA-2024:4420
- https://access.redhat.com/errata/RHSA-2024:4724
- https://access.redhat.com/errata/RHSA-2024:4727
- https://access.redhat.com/security/cve/CVE-2024-4467
- https://bugzilla.redhat.com/show_bug.cgi?id=2278875
- http://www.openwall.com/lists/oss-security/2024/07/23/2
- https://access.redhat.com/errata/RHSA-2024:4276
- https://access.redhat.com/errata/RHSA-2024:4277
- https://access.redhat.com/errata/RHSA-2024:4278
- https://access.redhat.com/errata/RHSA-2024:4372
- https://access.redhat.com/errata/RHSA-2024:4373
- https://access.redhat.com/errata/RHSA-2024:4374
- https://access.redhat.com/errata/RHSA-2024:4420
- https://access.redhat.com/errata/RHSA-2024:4724
- https://access.redhat.com/errata/RHSA-2024:4727
- https://access.redhat.com/security/cve/CVE-2024-4467
- https://bugzilla.redhat.com/show_bug.cgi?id=2278875
- https://security.netapp.com/advisory/ntap-20240822-0005/