Bug 1221237 (CVE-2024-1441) - VUL-0: CVE-2024-1441: libvirt: off-by-one error in udevListInterfacesByStatus()
Summary: VUL-0: CVE-2024-1441: libvirt: off-by-one error in udevListInterfacesByStatus()
Status: REOPENED
Alias: CVE-2024-1441
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/396809/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-1441:3.3:(AV:L...
Keywords:
Depends on:
Blocks:
 
Reported: 2024-03-11 13:59 UTC by SMASH SMASH
Modified: 2024-07-03 14:29 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-03-11 13:59:27 UTC
An off-by-one error was found in libvirt in the udevListInterfacesByStatus() function when the number of interfaces exceeds names_len. The issue can be reproduced by sending a specially crafted entry to the libvirt daemon and can lead to a segmentation fault. An unprivileged user could use this flaw to cause a denial of service condition.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-1441
https://bugzilla.redhat.com/show_bug.cgi?id=2263841
Comment 1 Alexander Bergmann 2024-03-11 15:14:41 UTC
Upstream commit:
https://github.com/libvirt/libvirt/commit/c664015fe3a7bf59db26686e9ed69af011c6ebb8
Comment 2 James Fehlig 2024-03-11 16:56:57 UTC
The commit is included in libvirt 10.1.0, so already fixed in Factory. The interface driver is disabled in ALP, so it's not affected. In SLES, the wicked interface backend is preferred over the udev backend, so in theory SLES is not affected. But it's certainly safe to backport the trivial commit, which we should only do for SLE12 SP5, SLE15 SP5, and SLE15 SP6 IMO. I'll work on that now.
Comment 5 James Fehlig 2024-03-12 20:33:36 UTC
(In reply to James Fehlig from comment #2)
> But it's certainly safe to backport the trivial
> commit, which we should only do for SLE12 SP5, SLE15 SP5, and SLE15 SP6 IMO.
> I'll work on that now.

Done now. Passing the bug to security...
Comment 11 Maintenance Automation 2024-03-27 12:30:07 UTC
SUSE-SU-2024:1005-1: An update that solves two vulnerabilities can now be installed.

Category: security (moderate)
Bug References: 1221237, 1221468
CVE References: CVE-2024-1441, CVE-2024-2496
Maintenance Incident: [SUSE:Maintenance:32944](https://smelt.suse.de/incident/32944/)
Sources used:
SUSE Linux Enterprise Software Development Kit 12 SP5 (src):
 libvirt-5.1.0-13.39.1
SUSE Linux Enterprise High Performance Computing 12 SP5 (src):
 libvirt-5.1.0-13.39.1
SUSE Linux Enterprise Server 12 SP5 (src):
 libvirt-5.1.0-13.39.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src):
 libvirt-5.1.0-13.39.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 13 Maintenance Automation 2024-04-08 12:31:33 UTC
SUSE-SU-2024:1099-1: An update that solves three vulnerabilities and has three security fixes can now be installed.

Category: security (moderate)
Bug References: 1214223, 1216980, 1220512, 1221237, 1221468, 1221815
CVE References: CVE-2024-1441, CVE-2024-2494, CVE-2024-2496
Maintenance Incident: [SUSE:Maintenance:32869](https://smelt.suse.de/incident/32869/)
Sources used:
openSUSE Leap 15.5 (src):
 libvirt-9.0.0-150500.6.20.1
SUSE Linux Enterprise Micro 5.5 (src):
 libvirt-9.0.0-150500.6.20.1
Basesystem Module 15-SP5 (src):
 libvirt-9.0.0-150500.6.20.1
Server Applications Module 15-SP5 (src):
 libvirt-9.0.0-150500.6.20.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.