A flaw was found in the RPC library APIs of libvirt. The RPC server deserialization code allocates memory for arrays before the non-negative length check is performed by the C API entry points. Passing a negative length to the g_new0 function results in a crash due to the negative length being treated as a huge positive number. This flaw allows a local, unprivileged user to perform a denial of service attack by causing the libvirt daemon to crash.
Metrics
Affected Vendors & Products
References
History
Fri, 22 Nov 2024 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 06 Nov 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-11-15T15:29:24.707Z
Reserved: 2024-03-15T09:04:20.469Z
Link: CVE-2024-2494

Updated: 2024-08-01T19:18:46.945Z

Status : Awaiting Analysis
Published: 2024-03-21T14:15:10.350
Modified: 2024-11-21T09:09:52.710
Link: CVE-2024-2494
