CVE-2013-4153

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2013-4153
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2013-4153.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2013-4153
Related
Published
2013-09-30T21:55:09Z
Modified
2024-09-18T01:00:20Z
Summary
[none]
Details

Double free vulnerability in the qemuAgentGetVCPUs function in qemu/qemu_agent.c in libvirt 1.0.6 through 1.1.0 allows remote attackers to cause a denial of service (daemon crash) via a cpu count request, as demonstrated by the "virsh vcpucount dom --guest" command.

References

Affected packages

Debian:11 / libvirt

Package

Name
libvirt
Purl
pkg:deb/debian/libvirt?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.0-4

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / libvirt

Package

Name
libvirt
Purl
pkg:deb/debian/libvirt?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.0-4

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / libvirt

Package

Name
libvirt
Purl
pkg:deb/debian/libvirt?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.0-4

Ecosystem specific

{
    "urgency": "not yet assigned"
}