CVE-2024-2494

NameCVE-2024-2494
DescriptionA flaw was found in the RPC library APIs of libvirt. The RPC server deserialization code allocates memory for arrays before the non-negative length check is performed by the C API entry points. Passing a negative length to the g_new0 function results in a crash due to the negative length being treated as a huge positive number. This flaw allows a local, unprivileged user to perform a denial of service attack by causing the libvirt daemon to crash.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3778-1
Debian Bugs1067461

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libvirt (PTS)jessie, jessie (lts)1.2.9-9+deb8u7vulnerable
stretch (security), stretch (lts), stretch3.0.0-4+deb9u5vulnerable
buster5.0.0-4+deb10u1vulnerable
buster (security)5.0.0-4+deb10u2fixed
bullseye7.0.0-3+deb11u2vulnerable
bookworm9.0.0-4vulnerable
trixie10.0.0-2vulnerable
sid10.2.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libvirtsourcebuster5.0.0-4+deb10u2DLA-3778-1
libvirtsource(unstable)10.2.0-11067461

Notes

https://bugzilla.redhat.com/show_bug.cgi?id=2270115
https://lists.libvirt.org/archives/list/devel@lists.libvirt.org/thread/BKRQXPLPC6B7FLHJXSBQYW7HNDEBW6RJ/
Fixed by: https://gitlab.com/libvirt/libvirt/-/commit/8a3f8d957507c1f8223fdcf25a3ff885b15557f2 (v10.2.0-rc1)

Search for package or bug name: Reporting problems