An update for libvirt is now available for openEuler-20.03-LTS-SP4
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2024-1469
Final
1.0
1.0
2024-04-19
Initial
2024-04-19
2024-04-19
openEuler SA Tool V1.0
2024-04-19
libvirt security update
An update for libvirt is now available for openEuler-20.03-LTS-SP4.
Libvirt is a C toolkit to interact with the virtualization capabilities of recent versions of Linux (and other OSes). The main package includes the libvirtd server exporting the virtualization support.
Security Fix(es):
An off-by-one error flaw was found in the udevListInterfacesByStatus() function in libvirt when the number of interfaces exceeds the size of the `names` array. This issue can be reproduced by sending specially crafted data to the libvirt daemon, allowing an unprivileged client to perform a denial of service attack by causing the libvirt daemon to crash.(CVE-2024-1441)
A flaw was found in the RPC library APIs of libvirt. The RPC server deserialization code allocates memory for arrays before the non-negative length check is performed by the C API entry points. Passing a negative length to the g_new0 function results in a crash due to the negative length being treated as a huge positive number. This flaw allows a local, unprivileged user to perform a denial of service attack by causing the libvirt daemon to crash.(CVE-2024-2494)
An update for libvirt is now available for openEuler-20.03-LTS-SP4.
openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
Medium
libvirt
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1469
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2024-1441
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2024-2494
https://nvd.nist.gov/vuln/detail/CVE-2024-1441
https://nvd.nist.gov/vuln/detail/CVE-2024-2494
openEuler-20.03-LTS-SP4
libvirt-daemon-driver-qemu-6.2.0-24.oe2003sp4.aarch64.rpm
libvirt-daemon-driver-storage-6.2.0-24.oe2003sp4.aarch64.rpm
libvirt-daemon-driver-storage-rbd-6.2.0-24.oe2003sp4.aarch64.rpm
libvirt-daemon-config-network-6.2.0-24.oe2003sp4.aarch64.rpm
libvirt-admin-6.2.0-24.oe2003sp4.aarch64.rpm
libvirt-daemon-driver-storage-iscsi-direct-6.2.0-24.oe2003sp4.aarch64.rpm
libvirt-bash-completion-6.2.0-24.oe2003sp4.aarch64.rpm
libvirt-daemon-driver-storage-mpath-6.2.0-24.oe2003sp4.aarch64.rpm
libvirt-daemon-kvm-6.2.0-24.oe2003sp4.aarch64.rpm
libvirt-daemon-driver-interface-6.2.0-24.oe2003sp4.aarch64.rpm
libvirt-daemon-driver-storage-logical-6.2.0-24.oe2003sp4.aarch64.rpm
libvirt-daemon-config-nwfilter-6.2.0-24.oe2003sp4.aarch64.rpm
libvirt-daemon-driver-storage-core-6.2.0-24.oe2003sp4.aarch64.rpm
libvirt-devel-6.2.0-24.oe2003sp4.aarch64.rpm
libvirt-daemon-driver-storage-gluster-6.2.0-24.oe2003sp4.aarch64.rpm
libvirt-daemon-driver-secret-6.2.0-24.oe2003sp4.aarch64.rpm
libvirt-nss-6.2.0-24.oe2003sp4.aarch64.rpm
libvirt-6.2.0-24.oe2003sp4.aarch64.rpm
libvirt-docs-6.2.0-24.oe2003sp4.aarch64.rpm
libvirt-daemon-driver-nodedev-6.2.0-24.oe2003sp4.aarch64.rpm
libvirt-debugsource-6.2.0-24.oe2003sp4.aarch64.rpm
libvirt-libs-6.2.0-24.oe2003sp4.aarch64.rpm
libvirt-daemon-driver-storage-disk-6.2.0-24.oe2003sp4.aarch64.rpm
libvirt-daemon-qemu-6.2.0-24.oe2003sp4.aarch64.rpm
libvirt-daemon-driver-nwfilter-6.2.0-24.oe2003sp4.aarch64.rpm
libvirt-client-6.2.0-24.oe2003sp4.aarch64.rpm
libvirt-lock-sanlock-6.2.0-24.oe2003sp4.aarch64.rpm
libvirt-daemon-driver-storage-scsi-6.2.0-24.oe2003sp4.aarch64.rpm
libvirt-daemon-driver-network-6.2.0-24.oe2003sp4.aarch64.rpm
libvirt-daemon-6.2.0-24.oe2003sp4.aarch64.rpm
libvirt-debuginfo-6.2.0-24.oe2003sp4.aarch64.rpm
libvirt-wireshark-6.2.0-24.oe2003sp4.aarch64.rpm
libvirt-daemon-driver-storage-iscsi-6.2.0-24.oe2003sp4.aarch64.rpm
libvirt-6.2.0-24.oe2003sp4.src.rpm
libvirt-wireshark-6.2.0-24.oe2003sp4.x86_64.rpm
libvirt-daemon-driver-nwfilter-6.2.0-24.oe2003sp4.x86_64.rpm
libvirt-lock-sanlock-6.2.0-24.oe2003sp4.x86_64.rpm
libvirt-daemon-6.2.0-24.oe2003sp4.x86_64.rpm
libvirt-daemon-driver-storage-scsi-6.2.0-24.oe2003sp4.x86_64.rpm
libvirt-daemon-driver-storage-mpath-6.2.0-24.oe2003sp4.x86_64.rpm
libvirt-daemon-driver-storage-iscsi-direct-6.2.0-24.oe2003sp4.x86_64.rpm
libvirt-client-6.2.0-24.oe2003sp4.x86_64.rpm
libvirt-daemon-driver-network-6.2.0-24.oe2003sp4.x86_64.rpm
libvirt-daemon-driver-secret-6.2.0-24.oe2003sp4.x86_64.rpm
libvirt-admin-6.2.0-24.oe2003sp4.x86_64.rpm
libvirt-devel-6.2.0-24.oe2003sp4.x86_64.rpm
libvirt-6.2.0-24.oe2003sp4.x86_64.rpm
libvirt-daemon-driver-qemu-6.2.0-24.oe2003sp4.x86_64.rpm
libvirt-daemon-driver-storage-6.2.0-24.oe2003sp4.x86_64.rpm
libvirt-docs-6.2.0-24.oe2003sp4.x86_64.rpm
libvirt-daemon-driver-storage-iscsi-6.2.0-24.oe2003sp4.x86_64.rpm
libvirt-daemon-driver-storage-disk-6.2.0-24.oe2003sp4.x86_64.rpm
libvirt-daemon-config-network-6.2.0-24.oe2003sp4.x86_64.rpm
libvirt-daemon-driver-nodedev-6.2.0-24.oe2003sp4.x86_64.rpm
libvirt-daemon-qemu-6.2.0-24.oe2003sp4.x86_64.rpm
libvirt-debugsource-6.2.0-24.oe2003sp4.x86_64.rpm
libvirt-daemon-driver-storage-gluster-6.2.0-24.oe2003sp4.x86_64.rpm
libvirt-libs-6.2.0-24.oe2003sp4.x86_64.rpm
libvirt-daemon-driver-interface-6.2.0-24.oe2003sp4.x86_64.rpm
libvirt-nss-6.2.0-24.oe2003sp4.x86_64.rpm
libvirt-daemon-kvm-6.2.0-24.oe2003sp4.x86_64.rpm
libvirt-daemon-driver-storage-rbd-6.2.0-24.oe2003sp4.x86_64.rpm
libvirt-daemon-config-nwfilter-6.2.0-24.oe2003sp4.x86_64.rpm
libvirt-daemon-driver-storage-logical-6.2.0-24.oe2003sp4.x86_64.rpm
libvirt-debuginfo-6.2.0-24.oe2003sp4.x86_64.rpm
libvirt-bash-completion-6.2.0-24.oe2003sp4.x86_64.rpm
libvirt-daemon-driver-storage-core-6.2.0-24.oe2003sp4.x86_64.rpm
An off-by-one error flaw was found in the udevListInterfacesByStatus() function in libvirt when the number of interfaces exceeds the size of the `names` array. This issue can be reproduced by sending specially crafted data to the libvirt daemon, allowing an unprivileged client to perform a denial of service attack by causing the libvirt daemon to crash.
2024-04-19
CVE-2024-1441
openEuler-20.03-LTS-SP4
Medium
5.5
AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
libvirt security update
2024-04-19
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1469
A flaw was found in the RPC library APIs of libvirt. The RPC server deserialization code allocates memory for arrays before the non-negative length check is performed by the C API entry points. Passing a negative length to the g_new0 function results in a crash due to the negative length being treated as a huge positive number. This flaw allows a local, unprivileged user to perform a denial of service attack by causing the libvirt daemon to crash.
2024-04-19
CVE-2024-2494
openEuler-20.03-LTS-SP4
Medium
6.2
AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
libvirt security update
2024-04-19
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1469