First published: Fri Aug 30 2024(Updated: )
A flaw was found in libvirt. A refactor of the code fetching the list of interfaces for multiple APIs introduced a corner case on platforms where allocating 0 bytes of memory results in a NULL pointer. This corner case would lead to a NULL-pointer dereference and subsequent crash of virtinterfaced. This issue could allow clients connecting to the read-only socket to crash the virtinterfaced daemon.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Red Hat Enterprise Linux | =9.0 | |
LibVIRT | >=10.4.0<10.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8235 is classified with a medium severity due to the potential for causing a crash of the application.
To mitigate CVE-2024-8235, update libvirt to a version above 10.7.0, as this issue is fixed in later releases.
CVE-2024-8235 affects libvirt versions from 10.4.0 to 10.7.0.
CVE-2024-8235 occurs on platforms where allocating 0 bytes results in a NULL pointer.
CVE-2024-8235 is a NULL-pointer dereference issue that can lead to application crashes.