MGASA-2024-0114

Source
https://advisories.mageia.org/MGASA-2024-0114.html
Import Source
https://advisories.mageia.org/MGASA-2024-0114.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2024-0114
Related
Published
2024-04-06T22:16:44Z
Modified
2024-04-06T21:54:00Z
Summary
Updated libvirt packages fix security vulnerability
Details

A flaw was found in the RPC library APIs of libvirt. The RPC server deserialization code allocates memory for arrays before the non-negative length check is performed by the C API entry points. Passing a negative length to the g_new0 function results in a crash due to the negative length being treated as a huge positive number. This flaw allows a local, unprivileged user to perform a denial of service attack by causing the libvirt daemon to crash. (CVE-2024-2494)

References
Credits

Affected packages

Mageia:9 / libvirt

Package

Name
libvirt
Purl
pkg:rpm/mageia/libvirt?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.6.0-1.1.mga9

Ecosystem specific

{
    "section": "core"
}