A flaw was found in the RPC library APIs of libvirt. The RPC server deserialization code allocates memory for arrays before the non-negative length check is performed by the C API entry points. Passing a negative length to the g_new0 function results in a crash due to the negative length being treated as a huge positive number. This flaw allows a local, unprivileged user to perform a denial of service attack by causing the libvirt daemon to crash.
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2024-03-21T13:39:08.847Z
Updated: 2024-05-22T17:10:15.731Z
Reserved: 2024-03-15T09:04:20.469Z
Link: CVE-2024-2494
JSON object: View
NVD Information
Status : Awaiting Analysis
Published: 2024-03-21T14:15:10.350
Modified: 2024-06-10T17:16:25.307
Link: CVE-2024-2494
JSON object: View
Redhat Information
No data.
CWE