Количество 14
Количество 14

CVE-2024-4418
A race condition leading to a stack use-after-free flaw was found in libvirt. Due to a bad assumption in the virNetClientIOEventLoop() method, the `data` pointer to a stack-allocated virNetClientIOEventData structure ended up being used in the virNetClientIOEventFD callback while the data pointer's stack frame was concurrently being "freed" when returning from virNetClientIOEventLoop(). The 'virtproxyd' daemon can be used to trigger requests. If libvirt is configured with fine-grained access control, this issue, in theory, allows a user to escape their otherwise limited access. This flaw allows a local, unprivileged user to access virtproxyd without authenticating. Remote users would need to authenticate before they could access it.

CVE-2024-4418
A race condition leading to a stack use-after-free flaw was found in libvirt. Due to a bad assumption in the virNetClientIOEventLoop() method, the `data` pointer to a stack-allocated virNetClientIOEventData structure ended up being used in the virNetClientIOEventFD callback while the data pointer's stack frame was concurrently being "freed" when returning from virNetClientIOEventLoop(). The 'virtproxyd' daemon can be used to trigger requests. If libvirt is configured with fine-grained access control, this issue, in theory, allows a user to escape their otherwise limited access. This flaw allows a local, unprivileged user to access virtproxyd without authenticating. Remote users would need to authenticate before they could access it.

CVE-2024-4418
A race condition leading to a stack use-after-free flaw was found in libvirt. Due to a bad assumption in the virNetClientIOEventLoop() method, the `data` pointer to a stack-allocated virNetClientIOEventData structure ended up being used in the virNetClientIOEventFD callback while the data pointer's stack frame was concurrently being "freed" when returning from virNetClientIOEventLoop(). The 'virtproxyd' daemon can be used to trigger requests. If libvirt is configured with fine-grained access control, this issue, in theory, allows a user to escape their otherwise limited access. This flaw allows a local, unprivileged user to access virtproxyd without authenticating. Remote users would need to authenticate before they could access it.

CVE-2024-4418
CVE-2024-4418
A race condition leading to a stack use-after-free flaw was found in l ...

SUSE-SU-2024:1962-1
Security update for libvirt

ROS-20240607-04
Уязвимость libvirt
GHSA-q262-3hfr-f5q4
A race condition leading to a stack use-after-free flaw was found in libvirt. Due to a bad assumption in the virNetClientIOEventLoop() method, the `data` pointer to a stack-allocated virNetClientIOEventData structure ended up being used in the virNetClientIOEventFD callback while the data pointer's stack frame was concurrently being "freed" when returning from virNetClientIOEventLoop(). The 'virtproxyd' daemon can be used to trigger requests. If libvirt is configured with fine-grained access control, this issue, in theory, allows a user to escape their otherwise limited access. This flaw allows a local, unprivileged user to access virtproxyd without authenticating. Remote users would need to authenticate before they could access it.
ELSA-2024-4757
ELSA-2024-4757: libvirt security update (MODERATE)
ELSA-2024-4351
ELSA-2024-4351: virt:ol and virt-devel:rhel security and bug fix update (LOW)
ELSA-2024-12673
ELSA-2024-12673: libvirt security update (IMPORTANT)

BDU:2024-04436
Уязвимость метода virNetClientIOEventLoop() библиотеки управления виртуализацией Libvirt, позволяющая нарушителю получить несанкционированный доступ к virtproxyd без аутентификации
ELSA-2024-12604
ELSA-2024-12604: virt:kvm_utils3 security update (IMPORTANT)
ELSA-2024-12605
ELSA-2024-12605: virt:kvm_utils2 security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2024-4418 A race condition leading to a stack use-after-free flaw was found in libvirt. Due to a bad assumption in the virNetClientIOEventLoop() method, the `data` pointer to a stack-allocated virNetClientIOEventData structure ended up being used in the virNetClientIOEventFD callback while the data pointer's stack frame was concurrently being "freed" when returning from virNetClientIOEventLoop(). The 'virtproxyd' daemon can be used to trigger requests. If libvirt is configured with fine-grained access control, this issue, in theory, allows a user to escape their otherwise limited access. This flaw allows a local, unprivileged user to access virtproxyd without authenticating. Remote users would need to authenticate before they could access it. | CVSS3: 6.2 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-4418 A race condition leading to a stack use-after-free flaw was found in libvirt. Due to a bad assumption in the virNetClientIOEventLoop() method, the `data` pointer to a stack-allocated virNetClientIOEventData structure ended up being used in the virNetClientIOEventFD callback while the data pointer's stack frame was concurrently being "freed" when returning from virNetClientIOEventLoop(). The 'virtproxyd' daemon can be used to trigger requests. If libvirt is configured with fine-grained access control, this issue, in theory, allows a user to escape their otherwise limited access. This flaw allows a local, unprivileged user to access virtproxyd without authenticating. Remote users would need to authenticate before they could access it. | CVSS3: 6.2 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-4418 A race condition leading to a stack use-after-free flaw was found in libvirt. Due to a bad assumption in the virNetClientIOEventLoop() method, the `data` pointer to a stack-allocated virNetClientIOEventData structure ended up being used in the virNetClientIOEventFD callback while the data pointer's stack frame was concurrently being "freed" when returning from virNetClientIOEventLoop(). The 'virtproxyd' daemon can be used to trigger requests. If libvirt is configured with fine-grained access control, this issue, in theory, allows a user to escape their otherwise limited access. This flaw allows a local, unprivileged user to access virtproxyd without authenticating. Remote users would need to authenticate before they could access it. | CVSS3: 6.2 | 0% Низкий | около 1 года назад |
![]() | CVSS3: 6.2 | 0% Низкий | около 1 года назад | |
CVE-2024-4418 A race condition leading to a stack use-after-free flaw was found in l ... | CVSS3: 6.2 | 0% Низкий | около 1 года назад | |
![]() | SUSE-SU-2024:1962-1 Security update for libvirt | 0% Низкий | около 1 года назад | |
![]() | ROS-20240607-04 Уязвимость libvirt | CVSS3: 6.2 | 0% Низкий | около 1 года назад |
GHSA-q262-3hfr-f5q4 A race condition leading to a stack use-after-free flaw was found in libvirt. Due to a bad assumption in the virNetClientIOEventLoop() method, the `data` pointer to a stack-allocated virNetClientIOEventData structure ended up being used in the virNetClientIOEventFD callback while the data pointer's stack frame was concurrently being "freed" when returning from virNetClientIOEventLoop(). The 'virtproxyd' daemon can be used to trigger requests. If libvirt is configured with fine-grained access control, this issue, in theory, allows a user to escape their otherwise limited access. This flaw allows a local, unprivileged user to access virtproxyd without authenticating. Remote users would need to authenticate before they could access it. | CVSS3: 6.2 | 0% Низкий | около 1 года назад | |
ELSA-2024-4757 ELSA-2024-4757: libvirt security update (MODERATE) | 11 месяцев назад | |||
ELSA-2024-4351 ELSA-2024-4351: virt:ol and virt-devel:rhel security and bug fix update (LOW) | 12 месяцев назад | |||
ELSA-2024-12673 ELSA-2024-12673: libvirt security update (IMPORTANT) | 9 месяцев назад | |||
![]() | BDU:2024-04436 Уязвимость метода virNetClientIOEventLoop() библиотеки управления виртуализацией Libvirt, позволяющая нарушителю получить несанкционированный доступ к virtproxyd без аутентификации | CVSS3: 6.2 | 0% Низкий | около 1 года назад |
ELSA-2024-12604 ELSA-2024-12604: virt:kvm_utils3 security update (IMPORTANT) | 10 месяцев назад | |||
ELSA-2024-12605 ELSA-2024-12605: virt:kvm_utils2 security update (IMPORTANT) | 10 месяцев назад |
Уязвимостей на страницу