Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3778-1 | libvirt security update |
EUVD |
EUVD-2024-27443 | A flaw was found in the RPC library APIs of libvirt. The RPC server deserialization code allocates memory for arrays before the non-negative length check is performed by the C API entry points. Passing a negative length to the g_new0 function results in a crash due to the negative length being treated as a huge positive number. This flaw allows a local, unprivileged user to perform a denial of service attack by causing the libvirt daemon to crash. |
Ubuntu USN |
USN-6734-1 | libvirt vulnerabilities |
Ubuntu USN |
USN-6734-2 | libvirt vulnerabilities |
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Fri, 22 Nov 2024 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 06 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-11-08T06:49:30.806Z
Reserved: 2024-03-15T09:04:20.469Z
Link: CVE-2024-2494
Updated: 2024-08-01T19:18:46.945Z
Status : Awaiting Analysis
Published: 2024-03-21T14:15:10.350
Modified: 2024-11-21T09:09:52.710
Link: CVE-2024-2494
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN