CVE-2024-4418 — Return of Stack Variable Address in Libvirt
Severity
6.2MEDIUMNVD
EPSS
0.5%
top 32.94%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 8
Latest updateMay 14
Description
A race condition leading to a stack use-after-free flaw was found in libvirt. Due to a bad assumption in the virNetClientIOEventLoop() method, the `data` pointer to a stack-allocated virNetClientIOEventData structure ended up being used in the virNetClientIOEventFD callback while the data pointer's stack frame was concurrently being "freed" when returning from virNetClientIOEventLoop(). The 'virtproxyd' daemon can be used to trigger requests. If libvirt is configured with fine-grained access con…
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 2.5 | Impact: 3.6
Affected Packages6 packages
🔴Vulnerability Details
2📋Vendor Advisories
4Debian▶
CVE-2024-4418: libvirt - A race condition leading to a stack use-after-free flaw was found in libvirt. Du...↗2024