Логотип exploitDog
bind:"GHSA-q262-3hfr-f5q4" OR bind:"CVE-2024-4418"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-q262-3hfr-f5q4" OR bind:"CVE-2024-4418"

Количество 14

Количество 14

github логотип

GHSA-q262-3hfr-f5q4

около 1 года назад

A race condition leading to a stack use-after-free flaw was found in libvirt. Due to a bad assumption in the virNetClientIOEventLoop() method, the `data` pointer to a stack-allocated virNetClientIOEventData structure ended up being used in the virNetClientIOEventFD callback while the data pointer's stack frame was concurrently being "freed" when returning from virNetClientIOEventLoop(). The 'virtproxyd' daemon can be used to trigger requests. If libvirt is configured with fine-grained access control, this issue, in theory, allows a user to escape their otherwise limited access. This flaw allows a local, unprivileged user to access virtproxyd without authenticating. Remote users would need to authenticate before they could access it.

CVSS3: 6.2
EPSS: Низкий
ubuntu логотип

CVE-2024-4418

около 1 года назад

A race condition leading to a stack use-after-free flaw was found in libvirt. Due to a bad assumption in the virNetClientIOEventLoop() method, the `data` pointer to a stack-allocated virNetClientIOEventData structure ended up being used in the virNetClientIOEventFD callback while the data pointer's stack frame was concurrently being "freed" when returning from virNetClientIOEventLoop(). The 'virtproxyd' daemon can be used to trigger requests. If libvirt is configured with fine-grained access control, this issue, in theory, allows a user to escape their otherwise limited access. This flaw allows a local, unprivileged user to access virtproxyd without authenticating. Remote users would need to authenticate before they could access it.

CVSS3: 6.2
EPSS: Низкий
redhat логотип

CVE-2024-4418

около 1 года назад

A race condition leading to a stack use-after-free flaw was found in libvirt. Due to a bad assumption in the virNetClientIOEventLoop() method, the `data` pointer to a stack-allocated virNetClientIOEventData structure ended up being used in the virNetClientIOEventFD callback while the data pointer's stack frame was concurrently being "freed" when returning from virNetClientIOEventLoop(). The 'virtproxyd' daemon can be used to trigger requests. If libvirt is configured with fine-grained access control, this issue, in theory, allows a user to escape their otherwise limited access. This flaw allows a local, unprivileged user to access virtproxyd without authenticating. Remote users would need to authenticate before they could access it.

CVSS3: 6.2
EPSS: Низкий
nvd логотип

CVE-2024-4418

около 1 года назад

A race condition leading to a stack use-after-free flaw was found in libvirt. Due to a bad assumption in the virNetClientIOEventLoop() method, the `data` pointer to a stack-allocated virNetClientIOEventData structure ended up being used in the virNetClientIOEventFD callback while the data pointer's stack frame was concurrently being "freed" when returning from virNetClientIOEventLoop(). The 'virtproxyd' daemon can be used to trigger requests. If libvirt is configured with fine-grained access control, this issue, in theory, allows a user to escape their otherwise limited access. This flaw allows a local, unprivileged user to access virtproxyd without authenticating. Remote users would need to authenticate before they could access it.

CVSS3: 6.2
EPSS: Низкий
msrc логотип

CVE-2024-4418

около 1 года назад

CVSS3: 6.2
EPSS: Низкий
debian логотип

CVE-2024-4418

около 1 года назад

A race condition leading to a stack use-after-free flaw was found in l ...

CVSS3: 6.2
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:1962-1

около 1 года назад

Security update for libvirt

EPSS: Низкий
redos логотип

ROS-20240607-04

около 1 года назад

Уязвимость libvirt

CVSS3: 6.2
EPSS: Низкий
oracle-oval логотип

ELSA-2024-4757

11 месяцев назад

ELSA-2024-4757: libvirt security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-4351

12 месяцев назад

ELSA-2024-4351: virt:ol and virt-devel:rhel security and bug fix update (LOW)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12673

9 месяцев назад

ELSA-2024-12673: libvirt security update (IMPORTANT)

EPSS: Низкий
fstec логотип

BDU:2024-04436

около 1 года назад

Уязвимость метода virNetClientIOEventLoop() библиотеки управления виртуализацией Libvirt, позволяющая нарушителю получить несанкционированный доступ к virtproxyd без аутентификации

CVSS3: 6.2
EPSS: Низкий
oracle-oval логотип

ELSA-2024-12604

10 месяцев назад

ELSA-2024-12604: virt:kvm_utils3 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12605

10 месяцев назад

ELSA-2024-12605: virt:kvm_utils2 security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-q262-3hfr-f5q4

A race condition leading to a stack use-after-free flaw was found in libvirt. Due to a bad assumption in the virNetClientIOEventLoop() method, the `data` pointer to a stack-allocated virNetClientIOEventData structure ended up being used in the virNetClientIOEventFD callback while the data pointer's stack frame was concurrently being "freed" when returning from virNetClientIOEventLoop(). The 'virtproxyd' daemon can be used to trigger requests. If libvirt is configured with fine-grained access control, this issue, in theory, allows a user to escape their otherwise limited access. This flaw allows a local, unprivileged user to access virtproxyd without authenticating. Remote users would need to authenticate before they could access it.

CVSS3: 6.2
0%
Низкий
около 1 года назад
ubuntu логотип
CVE-2024-4418

A race condition leading to a stack use-after-free flaw was found in libvirt. Due to a bad assumption in the virNetClientIOEventLoop() method, the `data` pointer to a stack-allocated virNetClientIOEventData structure ended up being used in the virNetClientIOEventFD callback while the data pointer's stack frame was concurrently being "freed" when returning from virNetClientIOEventLoop(). The 'virtproxyd' daemon can be used to trigger requests. If libvirt is configured with fine-grained access control, this issue, in theory, allows a user to escape their otherwise limited access. This flaw allows a local, unprivileged user to access virtproxyd without authenticating. Remote users would need to authenticate before they could access it.

CVSS3: 6.2
0%
Низкий
около 1 года назад
redhat логотип
CVE-2024-4418

A race condition leading to a stack use-after-free flaw was found in libvirt. Due to a bad assumption in the virNetClientIOEventLoop() method, the `data` pointer to a stack-allocated virNetClientIOEventData structure ended up being used in the virNetClientIOEventFD callback while the data pointer's stack frame was concurrently being "freed" when returning from virNetClientIOEventLoop(). The 'virtproxyd' daemon can be used to trigger requests. If libvirt is configured with fine-grained access control, this issue, in theory, allows a user to escape their otherwise limited access. This flaw allows a local, unprivileged user to access virtproxyd without authenticating. Remote users would need to authenticate before they could access it.

CVSS3: 6.2
0%
Низкий
около 1 года назад
nvd логотип
CVE-2024-4418

A race condition leading to a stack use-after-free flaw was found in libvirt. Due to a bad assumption in the virNetClientIOEventLoop() method, the `data` pointer to a stack-allocated virNetClientIOEventData structure ended up being used in the virNetClientIOEventFD callback while the data pointer's stack frame was concurrently being "freed" when returning from virNetClientIOEventLoop(). The 'virtproxyd' daemon can be used to trigger requests. If libvirt is configured with fine-grained access control, this issue, in theory, allows a user to escape their otherwise limited access. This flaw allows a local, unprivileged user to access virtproxyd without authenticating. Remote users would need to authenticate before they could access it.

CVSS3: 6.2
0%
Низкий
около 1 года назад
msrc логотип
CVSS3: 6.2
0%
Низкий
около 1 года назад
debian логотип
CVE-2024-4418

A race condition leading to a stack use-after-free flaw was found in l ...

CVSS3: 6.2
0%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:1962-1

Security update for libvirt

0%
Низкий
около 1 года назад
redos логотип
ROS-20240607-04

Уязвимость libvirt

CVSS3: 6.2
0%
Низкий
около 1 года назад
oracle-oval логотип
ELSA-2024-4757

ELSA-2024-4757: libvirt security update (MODERATE)

11 месяцев назад
oracle-oval логотип
ELSA-2024-4351

ELSA-2024-4351: virt:ol and virt-devel:rhel security and bug fix update (LOW)

12 месяцев назад
oracle-oval логотип
ELSA-2024-12673

ELSA-2024-12673: libvirt security update (IMPORTANT)

9 месяцев назад
fstec логотип
BDU:2024-04436

Уязвимость метода virNetClientIOEventLoop() библиотеки управления виртуализацией Libvirt, позволяющая нарушителю получить несанкционированный доступ к virtproxyd без аутентификации

CVSS3: 6.2
0%
Низкий
около 1 года назад
oracle-oval логотип
ELSA-2024-12604

ELSA-2024-12604: virt:kvm_utils3 security update (IMPORTANT)

10 месяцев назад
oracle-oval логотип
ELSA-2024-12605

ELSA-2024-12605: virt:kvm_utils2 security update (IMPORTANT)

10 месяцев назад

Уязвимостей на страницу