Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2024-4418 |
CWE-ID | CWE-362 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
openEuler Operating systems & Components / Operating system libvirt-daemon-driver-nwfilter Operating systems & Components / Operating system package or component libvirt-daemon-config-nwfilter Operating systems & Components / Operating system package or component libvirt-daemon-driver-storage-disk Operating systems & Components / Operating system package or component libvirt-daemon-driver-qemu Operating systems & Components / Operating system package or component libvirt-daemon-qemu Operating systems & Components / Operating system package or component libvirt-daemon-driver-storage-mpath Operating systems & Components / Operating system package or component libvirt-client Operating systems & Components / Operating system package or component libvirt-daemon Operating systems & Components / Operating system package or component libvirt-daemon-kvm Operating systems & Components / Operating system package or component libvirt-debugsource Operating systems & Components / Operating system package or component libvirt-daemon-driver-storage Operating systems & Components / Operating system package or component libvirt-daemon-driver-storage-iscsi-direct Operating systems & Components / Operating system package or component libvirt-daemon-driver-nodedev Operating systems & Components / Operating system package or component libvirt-lock-sanlock Operating systems & Components / Operating system package or component libvirt-libs Operating systems & Components / Operating system package or component libvirt-devel Operating systems & Components / Operating system package or component libvirt-daemon-driver-storage-scsi Operating systems & Components / Operating system package or component libvirt-daemon-driver-storage-gluster Operating systems & Components / Operating system package or component libvirt-docs Operating systems & Components / Operating system package or component libvirt-debuginfo Operating systems & Components / Operating system package or component libvirt-nss Operating systems & Components / Operating system package or component libvirt-daemon-driver-storage-core Operating systems & Components / Operating system package or component libvirt-daemon-driver-storage-logical Operating systems & Components / Operating system package or component libvirt-admin Operating systems & Components / Operating system package or component libvirt-daemon-config-network Operating systems & Components / Operating system package or component libvirt-daemon-driver-interface Operating systems & Components / Operating system package or component libvirt-daemon-driver-secret Operating systems & Components / Operating system package or component libvirt-daemon-driver-network Operating systems & Components / Operating system package or component libvirt-bash-completion Operating systems & Components / Operating system package or component libvirt-wireshark Operating systems & Components / Operating system package or component libvirt-daemon-driver-storage-rbd Operating systems & Components / Operating system package or component libvirt-daemon-driver-storage-iscsi Operating systems & Components / Operating system package or component libvirt Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU89356
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-4418
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition in virNetClientIOEventLoop(). A local user can exploit the race and gain unauthorized access to sensitive information and escalate privileges on the system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP1 - 22.03 LTS
libvirt-daemon-driver-nwfilter: before 6.2.0-21
libvirt-daemon-config-nwfilter: before 6.2.0-21
libvirt-daemon-driver-storage-disk: before 6.2.0-21
libvirt-daemon-driver-qemu: before 6.2.0-21
libvirt-daemon-qemu: before 6.2.0-21
libvirt-daemon-driver-storage-mpath: before 6.2.0-21
libvirt-client: before 6.2.0-21
libvirt-daemon: before 6.2.0-21
libvirt-daemon-kvm: before 6.2.0-21
libvirt-debugsource: before 6.2.0-21
libvirt-daemon-driver-storage: before 6.2.0-21
libvirt-daemon-driver-storage-iscsi-direct: before 6.2.0-21
libvirt-daemon-driver-nodedev: before 6.2.0-21
libvirt-lock-sanlock: before 6.2.0-21
libvirt-libs: before 6.2.0-21
libvirt-devel: before 6.2.0-21
libvirt-daemon-driver-storage-scsi: before 6.2.0-21
libvirt-daemon-driver-storage-gluster: before 6.2.0-21
libvirt-docs: before 6.2.0-21
libvirt-debuginfo: before 6.2.0-21
libvirt-nss: before 6.2.0-21
libvirt-daemon-driver-storage-core: before 6.2.0-21
libvirt-daemon-driver-storage-logical: before 6.2.0-21
libvirt-admin: before 6.2.0-21
libvirt-daemon-config-network: before 6.2.0-21
libvirt-daemon-driver-interface: before 6.2.0-21
libvirt-daemon-driver-secret: before 6.2.0-21
libvirt-daemon-driver-network: before 6.2.0-21
libvirt-bash-completion: before 6.2.0-21
libvirt-wireshark: before 6.2.0-21
libvirt-daemon-driver-storage-rbd: before 6.2.0-21
libvirt-daemon-driver-storage-iscsi: before 6.2.0-21
libvirt: before 6.2.0-21
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1683
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.