Количество 29
Количество 29

RLSA-2024:2560
Moderate: libvirt security and bug fix update
ELSA-2024-2560
ELSA-2024-2560: libvirt security and bug fix update (MODERATE)

SUSE-SU-2024:1099-1
Security update for libvirt

CVE-2024-2494
A flaw was found in the RPC library APIs of libvirt. The RPC server deserialization code allocates memory for arrays before the non-negative length check is performed by the C API entry points. Passing a negative length to the g_new0 function results in a crash due to the negative length being treated as a huge positive number. This flaw allows a local, unprivileged user to perform a denial of service attack by causing the libvirt daemon to crash.

CVE-2024-2494
A flaw was found in the RPC library APIs of libvirt. The RPC server deserialization code allocates memory for arrays before the non-negative length check is performed by the C API entry points. Passing a negative length to the g_new0 function results in a crash due to the negative length being treated as a huge positive number. This flaw allows a local, unprivileged user to perform a denial of service attack by causing the libvirt daemon to crash.

CVE-2024-2494
A flaw was found in the RPC library APIs of libvirt. The RPC server deserialization code allocates memory for arrays before the non-negative length check is performed by the C API entry points. Passing a negative length to the g_new0 function results in a crash due to the negative length being treated as a huge positive number. This flaw allows a local, unprivileged user to perform a denial of service attack by causing the libvirt daemon to crash.

CVE-2024-2494
CVE-2024-2494
A flaw was found in the RPC library APIs of libvirt. The RPC server de ...

CVE-2024-1441
An off-by-one error flaw was found in the udevListInterfacesByStatus() function in libvirt when the number of interfaces exceeds the size of the `names` array. This issue can be reproduced by sending specially crafted data to the libvirt daemon, allowing an unprivileged client to perform a denial of service attack by causing the libvirt daemon to crash.

CVE-2024-1441
An off-by-one error flaw was found in the udevListInterfacesByStatus() function in libvirt when the number of interfaces exceeds the size of the `names` array. This issue can be reproduced by sending specially crafted data to the libvirt daemon, allowing an unprivileged client to perform a denial of service attack by causing the libvirt daemon to crash.

CVE-2024-1441
An off-by-one error flaw was found in the udevListInterfacesByStatus() function in libvirt when the number of interfaces exceeds the size of the `names` array. This issue can be reproduced by sending specially crafted data to the libvirt daemon, allowing an unprivileged client to perform a denial of service attack by causing the libvirt daemon to crash.

CVE-2024-1441
CVE-2024-1441
An off-by-one error flaw was found in the udevListInterfacesByStatus() ...

SUSE-SU-2024:1100-1
Security update for libvirt

SUSE-SU-2024:1083-1
Security update for libvirt

SUSE-SU-2024:1078-1
Security update for libvirt
GHSA-h9fq-4hj4-g596
A flaw was found in the RPC library APIs of libvirt. The RPC server deserialization code allocates memory for arrays before the non-negative length check is performed by the C API entry points. Passing a negative length to the g_new0 function results in a crash due to the negative length being treated as a huge positive number. This flaw allows a local, unprivileged user to perform a denial of service attack by causing the libvirt daemon to crash.
ELSA-2024-3253
ELSA-2024-3253: virt:ol and virt-devel:rhel security update (MODERATE)

BDU:2024-02380
Уязвимость функции g_new0() библиотеки управления виртуализацией Libvirt, позволяющая нарушителю вызвать отказ в обслуживании
GHSA-2cj9-wjmr-5w57
An off-by-one error flaw was found in the udevListInterfacesByStatus() function in libvirt when the number of interfaces exceeds the size of the `names` array. This issue can be reproduced by sending specially crafted data to the libvirt daemon, allowing an unprivileged client to perform a denial of service attack by causing the libvirt daemon to crash.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | RLSA-2024:2560 Moderate: libvirt security and bug fix update | около 1 года назад | ||
ELSA-2024-2560 ELSA-2024-2560: libvirt security and bug fix update (MODERATE) | около 1 года назад | |||
![]() | SUSE-SU-2024:1099-1 Security update for libvirt | около 1 года назад | ||
![]() | CVE-2024-2494 A flaw was found in the RPC library APIs of libvirt. The RPC server deserialization code allocates memory for arrays before the non-negative length check is performed by the C API entry points. Passing a negative length to the g_new0 function results in a crash due to the negative length being treated as a huge positive number. This flaw allows a local, unprivileged user to perform a denial of service attack by causing the libvirt daemon to crash. | CVSS3: 6.2 | 0% Низкий | больше 1 года назад |
![]() | CVE-2024-2494 A flaw was found in the RPC library APIs of libvirt. The RPC server deserialization code allocates memory for arrays before the non-negative length check is performed by the C API entry points. Passing a negative length to the g_new0 function results in a crash due to the negative length being treated as a huge positive number. This flaw allows a local, unprivileged user to perform a denial of service attack by causing the libvirt daemon to crash. | CVSS3: 6.2 | 0% Низкий | больше 1 года назад |
![]() | CVE-2024-2494 A flaw was found in the RPC library APIs of libvirt. The RPC server deserialization code allocates memory for arrays before the non-negative length check is performed by the C API entry points. Passing a negative length to the g_new0 function results in a crash due to the negative length being treated as a huge positive number. This flaw allows a local, unprivileged user to perform a denial of service attack by causing the libvirt daemon to crash. | CVSS3: 6.2 | 0% Низкий | больше 1 года назад |
![]() | CVSS3: 6.2 | 0% Низкий | около 1 года назад | |
CVE-2024-2494 A flaw was found in the RPC library APIs of libvirt. The RPC server de ... | CVSS3: 6.2 | 0% Низкий | больше 1 года назад | |
![]() | CVE-2024-1441 An off-by-one error flaw was found in the udevListInterfacesByStatus() function in libvirt when the number of interfaces exceeds the size of the `names` array. This issue can be reproduced by sending specially crafted data to the libvirt daemon, allowing an unprivileged client to perform a denial of service attack by causing the libvirt daemon to crash. | CVSS3: 5.5 | 0% Низкий | больше 1 года назад |
![]() | CVE-2024-1441 An off-by-one error flaw was found in the udevListInterfacesByStatus() function in libvirt when the number of interfaces exceeds the size of the `names` array. This issue can be reproduced by sending specially crafted data to the libvirt daemon, allowing an unprivileged client to perform a denial of service attack by causing the libvirt daemon to crash. | CVSS3: 5.5 | 0% Низкий | больше 1 года назад |
![]() | CVE-2024-1441 An off-by-one error flaw was found in the udevListInterfacesByStatus() function in libvirt when the number of interfaces exceeds the size of the `names` array. This issue can be reproduced by sending specially crafted data to the libvirt daemon, allowing an unprivileged client to perform a denial of service attack by causing the libvirt daemon to crash. | CVSS3: 5.5 | 0% Низкий | больше 1 года назад |
![]() | CVSS3: 5.5 | 0% Низкий | 12 месяцев назад | |
CVE-2024-1441 An off-by-one error flaw was found in the udevListInterfacesByStatus() ... | CVSS3: 5.5 | 0% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2024:1100-1 Security update for libvirt | 0% Низкий | около 1 года назад | |
![]() | SUSE-SU-2024:1083-1 Security update for libvirt | 0% Низкий | около 1 года назад | |
![]() | SUSE-SU-2024:1078-1 Security update for libvirt | 0% Низкий | около 1 года назад | |
GHSA-h9fq-4hj4-g596 A flaw was found in the RPC library APIs of libvirt. The RPC server deserialization code allocates memory for arrays before the non-negative length check is performed by the C API entry points. Passing a negative length to the g_new0 function results in a crash due to the negative length being treated as a huge positive number. This flaw allows a local, unprivileged user to perform a denial of service attack by causing the libvirt daemon to crash. | CVSS3: 6.2 | 0% Низкий | больше 1 года назад | |
ELSA-2024-3253 ELSA-2024-3253: virt:ol and virt-devel:rhel security update (MODERATE) | около 1 года назад | |||
![]() | BDU:2024-02380 Уязвимость функции g_new0() библиотеки управления виртуализацией Libvirt, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 6.2 | 0% Низкий | больше 1 года назад |
GHSA-2cj9-wjmr-5w57 An off-by-one error flaw was found in the udevListInterfacesByStatus() function in libvirt when the number of interfaces exceeds the size of the `names` array. This issue can be reproduced by sending specially crafted data to the libvirt daemon, allowing an unprivileged client to perform a denial of service attack by causing the libvirt daemon to crash. | CVSS3: 5.5 | 0% Низкий | больше 1 года назад |
Уязвимостей на страницу