6.2 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
6.4 Medium
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
15.7%
libvirt is vulnerable to Use After Free. The vulnerability is due to a race condition in the virNetClientIOEventLoop()
method, where the data
pointer to a stack-allocated structure is used after the stack frame is freed. If libvirt is configured with fine-grained access control, an attacker could potentially escape their limited access. Furthermore, a local unprivileged user can access virtproxyd without authenticating.
CPE | Name | Operator | Version |
---|---|---|---|
libvirt.so | le | 0.10003.0 | |
libvirt.so | le | 0.10003.0 |
access.redhat.com/security/cve/CVE-2024-4418
bugzilla.redhat.com/show_bug.cgi?id=2278616
github.com/libvirt/libvirt/commit/8074d64dc2eca846d6a61efe1a9b7428a0ce1dd1
lists.fedoraproject.org/archives/list/[email protected]/message/4IE44UIIC3QWBFRB4EUSFNLJBU6JLNSD/
lists.fedoraproject.org/archives/list/[email protected]/message/Q4ZQBAJVHIZMCZNTRPUW3ZKXRKLXRQZU/
6.2 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
6.4 Medium
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
15.7%