ALT-PU-2025-15732-3
Closed vulnerabilities
Modified: 2024-11-11
BDU:2024-02380
Уязвимость функции g_new0() библиотеки управления виртуализацией Libvirt, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-11
BDU:2024-02834
Уязвимость функции udevListInterfacesByStatus() библиотеки libvirt, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-08-26
BDU:2024-04436
Уязвимость метода virNetClientIOEventLoop() библиотеки управления виртуализацией Libvirt, позволяющая нарушителю получить несанкционированный доступ к virtproxyd без аутентификации
BDU:2024-07002
Уязвимость библиотеки управления виртуализацией Libvirt, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-04-11
CVE-2024-1441
An off-by-one error flaw was found in the udevListInterfacesByStatus() function in libvirt when the number of interfaces exceeds the size of the `names` array. This issue can be reproduced by sending specially crafted data to the libvirt daemon, allowing an unprivileged client to perform a denial of service attack by causing the libvirt daemon to crash.
- https://access.redhat.com/errata/RHSA-2024:2560
- https://access.redhat.com/security/cve/CVE-2024-1441
- https://bugzilla.redhat.com/show_bug.cgi?id=2263841
- https://access.redhat.com/errata/RHSA-2024:2560
- https://access.redhat.com/security/cve/CVE-2024-1441
- https://bugzilla.redhat.com/show_bug.cgi?id=2263841
- https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/45FFKU3LODT345LAB5T4XZA5WKYMXJYU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6MVZO5GXDB7RHY6MS3ZXES3HPK34P3A/
- https://security.netapp.com/advisory/ntap-20250411-0003/
Modified: 2024-11-21
CVE-2024-2494
A flaw was found in the RPC library APIs of libvirt. The RPC server deserialization code allocates memory for arrays before the non-negative length check is performed by the C API entry points. Passing a negative length to the g_new0 function results in a crash due to the negative length being treated as a huge positive number. This flaw allows a local, unprivileged user to perform a denial of service attack by causing the libvirt daemon to crash.
- https://access.redhat.com/errata/RHSA-2024:2560
- https://access.redhat.com/errata/RHSA-2024:3253
- https://access.redhat.com/security/cve/CVE-2024-2494
- https://bugzilla.redhat.com/show_bug.cgi?id=2270115
- https://lists.libvirt.org/archives/list/devel@lists.libvirt.org/thread/BKRQXPLPC6B7FLHJXSBQYW7HNDEBW6RJ/
- https://access.redhat.com/errata/RHSA-2024:2560
- https://access.redhat.com/errata/RHSA-2024:3253
- https://access.redhat.com/security/cve/CVE-2024-2494
- https://bugzilla.redhat.com/show_bug.cgi?id=2270115
- https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html
- https://lists.libvirt.org/archives/list/devel@lists.libvirt.org/thread/BKRQXPLPC6B7FLHJXSBQYW7HNDEBW6RJ/
- https://security.netapp.com/advisory/ntap-20240517-0009/
Modified: 2025-04-11
CVE-2024-4418
A race condition leading to a stack use-after-free flaw was found in libvirt. Due to a bad assumption in the virNetClientIOEventLoop() method, the `data` pointer to a stack-allocated virNetClientIOEventData structure ended up being used in the virNetClientIOEventFD callback while the data pointer's stack frame was concurrently being "freed" when returning from virNetClientIOEventLoop(). The 'virtproxyd' daemon can be used to trigger requests. If libvirt is configured with fine-grained access control, this issue, in theory, allows a user to escape their otherwise limited access. This flaw allows a local, unprivileged user to access virtproxyd without authenticating. Remote users would need to authenticate before they could access it.
- https://access.redhat.com/errata/RHSA-2024:4351
- https://access.redhat.com/errata/RHSA-2024:4432
- https://access.redhat.com/errata/RHSA-2024:4757
- https://access.redhat.com/security/cve/CVE-2024-4418
- https://bugzilla.redhat.com/show_bug.cgi?id=2278616
- https://access.redhat.com/errata/RHSA-2024:4351
- https://access.redhat.com/errata/RHSA-2024:4432
- https://access.redhat.com/errata/RHSA-2024:4757
- https://access.redhat.com/security/cve/CVE-2024-4418
- https://bugzilla.redhat.com/show_bug.cgi?id=2278616
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4IE44UIIC3QWBFRB4EUSFNLJBU6JLNSD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q4ZQBAJVHIZMCZNTRPUW3ZKXRKLXRQZU/
- https://security.netapp.com/advisory/ntap-20250411-0002/
Modified: 2024-11-21
CVE-2024-8235
A flaw was found in libvirt. A refactor of the code fetching the list of interfaces for multiple APIs introduced a corner case on platforms where allocating 0 bytes of memory results in a NULL pointer. This corner case would lead to a NULL-pointer dereference and subsequent crash of virtinterfaced. This issue could allow clients connecting to the read-only socket to crash the virtinterfaced daemon.
- https://access.redhat.com/errata/RHSA-2024:9128
- https://access.redhat.com/security/cve/CVE-2024-8235
- https://bugzilla.redhat.com/show_bug.cgi?id=2308680
- https://lists.libvirt.org/archives/list/devel@lists.libvirt.org/thread/X6WOVCL6QF3FQRFIIXL736RFZVSUWLWJ/
- https://security.netapp.com/advisory/ntap-20240920-0006/
Modified: 2025-11-12
CVE-2025-12748
A flaw was discovered in libvirt in the XML file processing. More specifically, the parsing of user provided XML files was performed before the ACL checks. A malicious user with limited permissions could exploit this flaw by submitting a specially crafted XML file, causing libvirt to allocate too much memory on the host. The excessive memory consumption could lead to a libvirt process crash on the host, resulting in a denial-of-service condition.
Modified: 2025-11-18
CVE-2025-13193
A flaw was found in libvirt. External inactive snapshots for shut-down VMs are incorrectly created as world-readable, making it possible for unprivileged users to inspect the guest OS contents. This results in an information disclosure vulnerability.