A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file.
https://bugzilla.redhat.com/show_bug.cgi?id=2278875
https://access.redhat.com/security/cve/CVE-2024-4467
https://access.redhat.com/errata/RHSA-2024:4727
https://access.redhat.com/errata/RHSA-2024:4724
https://access.redhat.com/errata/RHSA-2024:4420
https://access.redhat.com/errata/RHSA-2024:4374
https://access.redhat.com/errata/RHSA-2024:4373
https://access.redhat.com/errata/RHSA-2024:4372
https://access.redhat.com/errata/RHSA-2024:4278