Risk | Low |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2024-1441 CVE-2024-2494 |
CWE-ID | CWE-193 CWE-789 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
openEuler Operating systems & Components / Operating system libvirt-daemon-driver-storage-iscsi Operating systems & Components / Operating system package or component libvirt-wireshark Operating systems & Components / Operating system package or component libvirt-debuginfo Operating systems & Components / Operating system package or component libvirt-daemon Operating systems & Components / Operating system package or component libvirt-daemon-driver-network Operating systems & Components / Operating system package or component libvirt-daemon-driver-storage-scsi Operating systems & Components / Operating system package or component libvirt-lock-sanlock Operating systems & Components / Operating system package or component libvirt-client Operating systems & Components / Operating system package or component libvirt-daemon-driver-nwfilter Operating systems & Components / Operating system package or component libvirt-daemon-qemu Operating systems & Components / Operating system package or component libvirt-daemon-driver-storage-disk Operating systems & Components / Operating system package or component libvirt-libs Operating systems & Components / Operating system package or component libvirt-debugsource Operating systems & Components / Operating system package or component libvirt-daemon-driver-nodedev Operating systems & Components / Operating system package or component libvirt-docs Operating systems & Components / Operating system package or component libvirt-nss Operating systems & Components / Operating system package or component libvirt-daemon-driver-secret Operating systems & Components / Operating system package or component libvirt-daemon-driver-storage-gluster Operating systems & Components / Operating system package or component libvirt-devel Operating systems & Components / Operating system package or component libvirt-daemon-driver-storage-core Operating systems & Components / Operating system package or component libvirt-daemon-config-nwfilter Operating systems & Components / Operating system package or component libvirt-daemon-driver-storage-logical Operating systems & Components / Operating system package or component libvirt-daemon-driver-interface Operating systems & Components / Operating system package or component libvirt-daemon-kvm Operating systems & Components / Operating system package or component libvirt-daemon-driver-storage-mpath Operating systems & Components / Operating system package or component libvirt-bash-completion Operating systems & Components / Operating system package or component libvirt-daemon-driver-storage-iscsi-direct Operating systems & Components / Operating system package or component libvirt-admin Operating systems & Components / Operating system package or component libvirt-daemon-config-network Operating systems & Components / Operating system package or component libvirt-daemon-driver-storage-rbd Operating systems & Components / Operating system package or component libvirt-daemon-driver-storage Operating systems & Components / Operating system package or component libvirt-daemon-driver-qemu Operating systems & Components / Operating system package or component libvirt Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU87448
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-1441
CWE-ID:
CWE-193 - Off-by-one Error
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an off-by-one error in the udevListInterfacesByStatus() function when the number of interfaces exceeds the size of the "names" array. A local user can trigger an off-by-one error and crash the daemon.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
libvirt-daemon-driver-storage-iscsi: before 6.2.0-24
libvirt-wireshark: before 6.2.0-24
libvirt-debuginfo: before 6.2.0-24
libvirt-daemon: before 6.2.0-24
libvirt-daemon-driver-network: before 6.2.0-24
libvirt-daemon-driver-storage-scsi: before 6.2.0-24
libvirt-lock-sanlock: before 6.2.0-24
libvirt-client: before 6.2.0-24
libvirt-daemon-driver-nwfilter: before 6.2.0-24
libvirt-daemon-qemu: before 6.2.0-24
libvirt-daemon-driver-storage-disk: before 6.2.0-24
libvirt-libs: before 6.2.0-24
libvirt-debugsource: before 6.2.0-24
libvirt-daemon-driver-nodedev: before 6.2.0-24
libvirt-docs: before 6.2.0-24
libvirt-nss: before 6.2.0-24
libvirt-daemon-driver-secret: before 6.2.0-24
libvirt-daemon-driver-storage-gluster: before 6.2.0-24
libvirt-devel: before 6.2.0-24
libvirt-daemon-driver-storage-core: before 6.2.0-24
libvirt-daemon-config-nwfilter: before 6.2.0-24
libvirt-daemon-driver-storage-logical: before 6.2.0-24
libvirt-daemon-driver-interface: before 6.2.0-24
libvirt-daemon-kvm: before 6.2.0-24
libvirt-daemon-driver-storage-mpath: before 6.2.0-24
libvirt-bash-completion: before 6.2.0-24
libvirt-daemon-driver-storage-iscsi-direct: before 6.2.0-24
libvirt-admin: before 6.2.0-24
libvirt-daemon-config-network: before 6.2.0-24
libvirt-daemon-driver-storage-rbd: before 6.2.0-24
libvirt-daemon-driver-storage: before 6.2.0-24
libvirt-daemon-driver-qemu: before 6.2.0-24
libvirt: before 6.2.0-24
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1469
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU87970
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-2494
CWE-ID:
CWE-789 - Uncontrolled Memory Allocation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to uncontrolled memory allocation within the g_new0() function. A local user can perform a denial of service (DoS) attack.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
libvirt-daemon-driver-storage-iscsi: before 6.2.0-24
libvirt-wireshark: before 6.2.0-24
libvirt-debuginfo: before 6.2.0-24
libvirt-daemon: before 6.2.0-24
libvirt-daemon-driver-network: before 6.2.0-24
libvirt-daemon-driver-storage-scsi: before 6.2.0-24
libvirt-lock-sanlock: before 6.2.0-24
libvirt-client: before 6.2.0-24
libvirt-daemon-driver-nwfilter: before 6.2.0-24
libvirt-daemon-qemu: before 6.2.0-24
libvirt-daemon-driver-storage-disk: before 6.2.0-24
libvirt-libs: before 6.2.0-24
libvirt-debugsource: before 6.2.0-24
libvirt-daemon-driver-nodedev: before 6.2.0-24
libvirt-docs: before 6.2.0-24
libvirt-nss: before 6.2.0-24
libvirt-daemon-driver-secret: before 6.2.0-24
libvirt-daemon-driver-storage-gluster: before 6.2.0-24
libvirt-devel: before 6.2.0-24
libvirt-daemon-driver-storage-core: before 6.2.0-24
libvirt-daemon-config-nwfilter: before 6.2.0-24
libvirt-daemon-driver-storage-logical: before 6.2.0-24
libvirt-daemon-driver-interface: before 6.2.0-24
libvirt-daemon-kvm: before 6.2.0-24
libvirt-daemon-driver-storage-mpath: before 6.2.0-24
libvirt-bash-completion: before 6.2.0-24
libvirt-daemon-driver-storage-iscsi-direct: before 6.2.0-24
libvirt-admin: before 6.2.0-24
libvirt-daemon-config-network: before 6.2.0-24
libvirt-daemon-driver-storage-rbd: before 6.2.0-24
libvirt-daemon-driver-storage: before 6.2.0-24
libvirt-daemon-driver-qemu: before 6.2.0-24
libvirt: before 6.2.0-24
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1469
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.