CVE-2024-2494

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2024-2494
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-2494.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-2494
Related
Published
2024-03-21T14:15:10Z
Modified
2024-09-14T01:56:40.319002Z
Summary
[none]
Details

A flaw was found in the RPC library APIs of libvirt. The RPC server deserialization code allocates memory for arrays before the non-negative length check is performed by the C API entry points. Passing a negative length to the g_new0 function results in a crash due to the negative length being treated as a huge positive number. This flaw allows a local, unprivileged user to perform a denial of service attack by causing the libvirt daemon to crash.

References

Affected packages

Debian:11 / libvirt

Package

Name
libvirt
Purl
pkg:deb/debian/libvirt?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.0.0-3+deb11u3

Affected versions

7.*

7.0.0-3
7.0.0-3+deb11u1
7.0.0-3+deb11u2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / libvirt

Package

Name
libvirt
Purl
pkg:deb/debian/libvirt?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.0.0-4+deb12u1

Affected versions

9.*

9.0.0-4

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / libvirt

Package

Name
libvirt
Purl
pkg:deb/debian/libvirt?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
10.2.0-1

Affected versions

9.*

9.0.0-4
9.1.0-1
9.2.0-1
9.2.0-2
9.3.0-1
9.3.0-2
9.4.0-1
9.5.0-1
9.5.0-2
9.6.0-1
9.6.0-2
9.6.0-3
9.7.0-1
9.8.0-1
9.8.0-2
9.9.0-1
9.10.0-1

10.*

10.0.0-1
10.0.0-2
10.0.0-3
10.1.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}