CVE-2024-1930

No Limit on Number of Open Sessions / Bad Session Close Behaviour in dnf5daemon-server before 5.1.17 allows a malicious user to impact Availability via No Limit on Number of Open Sessions. There is no limit on how many sessions D-Bus clients may create using the `open_session()` D-Bus method. For each session a thread is created in dnf5daemon-server. This spends a couple of hundred megabytes of memory in the process. Further connections will become impossible, likely because no more threads can be spawned by the D-Bus service.
References
Link Resource
https://www.openwall.com/lists/oss-security/2024/03/04/2 Exploit Mailing List Third Party Advisory
https://www.openwall.com/lists/oss-security/2024/03/04/2 Exploit Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:rpm-software-management:dnf5:*:*:*:*:*:*:*:*

History

07 Aug 2025, 17:21

Type Values Removed Values Added
CPE cpe:2.3:a:rpm-software-management:dnf5:*:*:*:*:*:*:*:*
First Time Rpm-software-management dnf5
Rpm-software-management
References () https://www.openwall.com/lists/oss-security/2024/03/04/2 - () https://www.openwall.com/lists/oss-security/2024/03/04/2 - Exploit, Mailing List, Third Party Advisory

Information

Published : 2024-05-08 02:15

Updated : 2025-08-07 17:21


NVD link : CVE-2024-1930

Mitre link : CVE-2024-1930

CVE.ORG link : CVE-2024-1930


JSON object : View

Products Affected

rpm-software-management

  • dnf5
CWE
CWE-400

Uncontrolled Resource Consumption