6.2

CVE-2024-2494

A flaw was found in the RPC library APIs of libvirt. The RPC server deserialization code allocates memory for arrays before the non-negative length check is performed by the C API entry points. Passing a negative length to the g_new0 function results in a crash due to the negative length being treated as a huge positive number. This flaw allows a local, unprivileged user to perform a denial of service attack by causing the libvirt daemon to crash.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
Collection URLhttps://gitlab.com/libvirt/libvirt/
Package libvirt
Default Statusunaffected
Version < 9.7.0
Version 9.0.0
Status affected
VendorRed Hat
Product Red Hat Enterprise Linux 8
Default Statusaffected
Version < *
Version 8100020240409073027.489197e6
Status unaffected
VendorRed Hat
Product Red Hat Enterprise Linux 8
Default Statusaffected
Version < *
Version 8100020240409073027.489197e6
Status unaffected
VendorRed Hat
Product Red Hat Enterprise Linux 9
Default Statusaffected
Version < *
Version 0:10.0.0-6.2.el9_4
Status unaffected
VendorRed Hat
Product Red Hat Enterprise Linux 6
Default Statusunknown
VendorRed Hat
Product Red Hat Enterprise Linux 7
Default Statusunknown
VendorRed Hat
Product Red Hat Enterprise Linux 8 Advanced Virtualization
Default Statusaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.08
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
secalert@redhat.com 6.2 2.5 3.6
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE-789 Memory Allocation with Excessive Size Value

The product allocates memory based on an untrusted, large size value, but it does not ensure that the size is within expected limits, allowing arbitrary amounts of memory to be allocated.