A flaw was found in the RPC library APIs of libvirt. The RPC server deserialization code allocates memory for arrays before the non-negative length check is performed by the C API entry points. Passing a negative length to the g_new0 function results in a crash due to the negative length being treated as a huge positive number. This flaw allows a local, unprivileged user to perform a denial of service attack by causing the libvirt daemon to crash.
Metrics
Affected Vendors & Products
References
History
Fri, 22 Nov 2024 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 06 Nov 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2024-03-21T13:39:08.847Z
Updated: 2024-11-15T15:29:24.707Z
Reserved: 2024-03-15T09:04:20.469Z
Link: CVE-2024-2494
Vulnrichment
Updated: 2024-08-01T19:18:46.945Z
NVD
Status : Awaiting Analysis
Published: 2024-03-21T14:15:10.350
Modified: 2024-11-21T09:09:52.710
Link: CVE-2024-2494
Redhat