Описание
Security update for libvirt
This update for libvirt fixes the following issues:
- CVE-2024-4418: Fixed a stack use-after-free by ensuring temporary GSource is removed from client event loop. (bsc#1223849)
Список пакетов
Container suse/manager/5.0/x86_64/server:latest
Image SLES15-SP6-SAP-BYOS
Image SLES15-SP6-SAP-BYOS-Azure
Image SLES15-SP6-SAP-BYOS-EC2
Image SLES15-SP6-SAP-BYOS-GCE
Image SLES15-SP6-SAP-Hardened
Image SLES15-SP6-SAP-Hardened-Azure
Image SLES15-SP6-SAP-Hardened-BYOS
Image SLES15-SP6-SAP-Hardened-BYOS-Azure
Image SLES15-SP6-SAP-Hardened-BYOS-EC2
Image SLES15-SP6-SAP-Hardened-BYOS-GCE
Image SLES15-SP6-SAP-Hardened-EC2
Image SLES15-SP6-SAP-Hardened-GCE
SUSE Linux Enterprise Module for Basesystem 15 SP6
SUSE Linux Enterprise Module for Server Applications 15 SP6
openSUSE Leap 15.6
Ссылки
- Link for SUSE-SU-2024:1962-1
- E-Mail link for SUSE-SU-2024:1962-1
- SUSE Security Ratings
- SUSE Bug 1222584
- SUSE Bug 1223849
- SUSE CVE CVE-2024-4418 page
Описание
A race condition leading to a stack use-after-free flaw was found in libvirt. Due to a bad assumption in the virNetClientIOEventLoop() method, the `data` pointer to a stack-allocated virNetClientIOEventData structure ended up being used in the virNetClientIOEventFD callback while the data pointer's stack frame was concurrently being "freed" when returning from virNetClientIOEventLoop(). The 'virtproxyd' daemon can be used to trigger requests. If libvirt is configured with fine-grained access control, this issue, in theory, allows a user to escape their otherwise limited access. This flaw allows a local, unprivileged user to access virtproxyd without authenticating. Remote users would need to authenticate before they could access it.
Затронутые продукты
Ссылки
- CVE-2024-4418
- SUSE Bug 1223849