A race condition leading to a stack use-after-free flaw in libvir
Reporter | Title | Published | Views | Family All 77 |
---|---|---|---|---|
Fedora | [SECURITY] Fedora 39 Update: libvirt-9.7.0-4.fc39 | 21 Jun 202401:16 | – | fedora |
Fedora | [SECURITY] Fedora 40 Update: libvirt-10.1.0-2.fc40 | 11 Jun 202401:51 | – | fedora |
OSV | Low: virt:rhel and virt-devel:rhel security and bug fix update | 8 Jul 202400:00 | – | osv |
OSV | Low: virt:rhel and virt-devel:rhel security and bug fix update | 15 Jul 202412:17 | – | osv |
OSV | libvirt vulnerability | 7 May 202411:21 | – | osv |
OSV | libvirt-10.3.0-2.1 on GA media | 15 Jun 202400:00 | – | osv |
OSV | Moderate: libvirt security update | 23 Jul 202400:00 | – | osv |
OSV | Security update for libvirt | 10 Jun 202411:09 | – | osv |
OSV | Red Hat Security Advisory: libvirt security update | 13 Sep 202421:33 | – | osv |
OSV | Red Hat Security Advisory: virt:rhel and virt-devel:rhel security and bug fix update | 13 Sep 202421:32 | – | osv |
Source | Link |
---|---|
ubuntu | www.ubuntu.com/security/CVE-2024-4418 |
cve | www.cve.org/CVERecord |
ubuntu | www.ubuntu.com/security/notices/USN-6763-1 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo