Source: libvirt Version: 10.1.0-1 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerability was published for libvirt. CVE-2024-2494[0]: | A flaw was found in the RPC library APIs of libvirt. The RPC server | deserialization code allocates memory for arrays before the non- | negative length check is performed by the C API entry points. | Passing a negative length to the g_new0 function results in a crash | due to the negative length being treated as a huge positive number. | This flaw allows a local, unprivileged user to perform a denial of | service attack by causing the libvirt daemon to crash. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2024-2494 https://www.cve.org/CVERecord?id=CVE-2024-2494 [1] https://gitlab.com/libvirt/libvirt/-/commit/8a3f8d957507c1f8223fdcf25a3ff885b15557f2 Please adjust the affected versions in the BTS as needed. Regards, Salvatore