{
  "threat_severity" : "Important",
  "public_date" : "2024-07-02T15:00:00Z",
  "bugzilla" : {
    "description" : "qemu-kvm: 'qemu-img info' leads to host file read/write",
    "id" : "2278875",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2278875"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.8",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-787",
  "details" : [ "A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file.", "A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file." ],
  "statement" : "The impact of this vulnerability in OpenShift Virtualization is downgraded to Low due to the restrictions of the container environment it runs within. As a restricted user within the context of a restricted container, the external files that could be read or written to would already be accessible by an attacker and limited to within the container. CDI additionally uses memory and CPU limits to prevent uncontrolled resource consumption that could otherwise lead to a denial of service.",
  "acknowledgement" : "Red Hat would like to thank Martin Kaesberger for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Advanced Virtualization for RHEL 8.2.1",
    "release_date" : "2024-07-23T00:00:00Z",
    "advisory" : "RHSA-2024:4727",
    "cpe" : "cpe:/a:redhat:advanced_virtualization:8.2::el8",
    "package" : "virt:8.2-8020120240708124623.863bb0db"
  }, {
    "product_name" : "Advanced Virtualization for RHEL 8.4.0.EUS",
    "release_date" : "2024-07-23T00:00:00Z",
    "advisory" : "RHSA-2024:4724",
    "cpe" : "cpe:/a:redhat:advanced_virtualization:8.4::el8",
    "package" : "virt:av-8040020240708093550.522a0ee4"
  }, {
    "product_name" : "Advanced Virtualization for RHEL 8.4.0.EUS",
    "release_date" : "2024-07-23T00:00:00Z",
    "advisory" : "RHSA-2024:4724",
    "cpe" : "cpe:/a:redhat:advanced_virtualization:8.4::el8",
    "package" : "virt-devel:av-8040020240708093550.522a0ee4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2024-07-09T00:00:00Z",
    "advisory" : "RHSA-2024:4420",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "virt-devel:rhel-8100020240704072441.489197e6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2024-07-09T00:00:00Z",
    "advisory" : "RHSA-2024:4420",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "virt:rhel-8100020240704072441.489197e6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support",
    "release_date" : "2024-07-08T00:00:00Z",
    "advisory" : "RHSA-2024:4374",
    "cpe" : "cpe:/a:redhat:rhel_aus:8.4",
    "package" : "virt:rhel-8040020240703100448.522a0ee4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.4 Telecommunications Update Service",
    "release_date" : "2024-07-08T00:00:00Z",
    "advisory" : "RHSA-2024:4374",
    "cpe" : "cpe:/a:redhat:rhel_tus:8.4",
    "package" : "virt:rhel-8040020240703100448.522a0ee4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions",
    "release_date" : "2024-07-08T00:00:00Z",
    "advisory" : "RHSA-2024:4374",
    "cpe" : "cpe:/a:redhat:rhel_e4s:8.4",
    "package" : "virt:rhel-8040020240703100448.522a0ee4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support",
    "release_date" : "2024-07-08T00:00:00Z",
    "advisory" : "RHSA-2024:4373",
    "cpe" : "cpe:/a:redhat:rhel_aus:8.6",
    "package" : "virt:rhel-8060020240703092415.ad008a3a"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Telecommunications Update Service",
    "release_date" : "2024-07-08T00:00:00Z",
    "advisory" : "RHSA-2024:4373",
    "cpe" : "cpe:/a:redhat:rhel_tus:8.6",
    "package" : "virt:rhel-8060020240703092415.ad008a3a"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions",
    "release_date" : "2024-07-08T00:00:00Z",
    "advisory" : "RHSA-2024:4373",
    "cpe" : "cpe:/a:redhat:rhel_e4s:8.6",
    "package" : "virt:rhel-8060020240703092415.ad008a3a"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.8 Extended Update Support",
    "release_date" : "2024-07-08T00:00:00Z",
    "advisory" : "RHSA-2024:4372",
    "cpe" : "cpe:/a:redhat:rhel_eus:8.8",
    "package" : "virt-devel:rhel-8080020240703085245.63b34585"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.8 Extended Update Support",
    "release_date" : "2024-07-08T00:00:00Z",
    "advisory" : "RHSA-2024:4372",
    "cpe" : "cpe:/a:redhat:rhel_eus:8.8",
    "package" : "virt:rhel-8080020240703085245.63b34585"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2024-07-02T00:00:00Z",
    "advisory" : "RHSA-2024:4278",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "qemu-kvm-17:8.2.0-11.el9_4.4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions",
    "release_date" : "2024-07-02T00:00:00Z",
    "advisory" : "RHSA-2024:4276",
    "cpe" : "cpe:/a:redhat:rhel_e4s:9.0",
    "package" : "qemu-kvm-17:6.2.0-11.el9_0.9"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.2 Extended Update Support",
    "release_date" : "2024-07-02T00:00:00Z",
    "advisory" : "RHSA-2024:4277",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.2",
    "package" : "qemu-kvm-17:7.2.0-14.el9_2.11"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "fix_state" : "Not affected",
    "package_name" : "qemu-kvm",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "qemu-kvm",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "qemu-kvm",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "qemu-kvm-ma",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8 Advanced Virtualization",
    "fix_state" : "Affected",
    "package_name" : "virt:av/qemu-kvm",
    "cpe" : "cpe:/a:redhat:advanced_virtualization:8::el8"
  }, {
    "product_name" : "Red Hat OpenShift Virtualization 4",
    "fix_state" : "Fix deferred",
    "package_name" : "container-native-virtualization/virt-cdi-operator-rhel9",
    "cpe" : "cpe:/a:redhat:container_native_virtualization:4",
    "impact" : "low"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2024-4467\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-4467" ],
  "name" : "CVE-2024-4467",
  "csaw" : false
}