First published: Mon Mar 18 2024(Updated: )
A flaw was found in the RPC library APIs of libvirt. The RPC server de-serialization code allocates memory for arrays before the non-negative length check is performed by the C API entry points. Passing a negative length to the g_new0 function results in a crash due to the negative length being treated as a huge positive number. A local unprivileged user could use this flaw to perform a denial of service attack by causing the libvirt daemon to crash.
Affected Software | Affected Version | How to fix |
---|---|---|
libvirt |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2270115 is classified as high due to the potential for crashing the application.
To fix REDHAT-BUG-2270115, you should update to the latest version of libvirt that incorporates the necessary security patches.
REDHAT-BUG-2270115 affects systems that utilize the libvirt RPC library APIs.
A workaround for REDHAT-BUG-2270115 involves avoiding the use of affected RPC API calls until a patch is applied.
You should use the latest stable version of libvirt that has addressed the vulnerabilities mentioned in REDHAT-BUG-2270115.