CVE-2024-4418Return of Stack Variable Address in Libvirt

Severity
6.2MEDIUMNVD
EPSS
0.5%
top 32.94%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 8
Latest updateMay 14

Description

A race condition leading to a stack use-after-free flaw was found in libvirt. Due to a bad assumption in the virNetClientIOEventLoop() method, the `data` pointer to a stack-allocated virNetClientIOEventData structure ended up being used in the virNetClientIOEventFD callback while the data pointer's stack frame was concurrently being "freed" when returning from virNetClientIOEventLoop(). The 'virtproxyd' daemon can be used to trigger requests. If libvirt is configured with fine-grained access con

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 2.5 | Impact: 3.6

Affected Packages6 packages

🔴Vulnerability Details

2
OSV
CVE-2024-4418: A race condition leading to a stack use-after-free flaw was found in libvirt2024-05-08
GHSA
GHSA-q262-3hfr-f5q4: A race condition leading to a stack use-after-free flaw was found in libvirt2024-05-08

📋Vendor Advisories

4
Microsoft
Libvirt: stack use-after-free in virnetclientioeventloop()2024-05-14
Ubuntu
libvirt vulnerability2024-05-07
Red Hat
libvirt: stack use-after-free in virNetClientIOEventLoop()2024-05-02
Debian
CVE-2024-4418: libvirt - A race condition leading to a stack use-after-free flaw was found in libvirt. Du...2024