CVE-2024-8235
Published: August 31, 2024Last modified: June 17, 2025
Description
A flaw was found in libvirt. A refactor of the code fetching the list of interfaces for multiple APIs introduced a corner case on platforms where allocating 0 bytes of memory results in a NULL pointer. This corner case would lead to a NULL-pointer dereference and subsequent crash of virtinterfaced. This issue could allow clients connecting to the read-only socket to crash the virtinterfaced daemon.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 6.2 |
| Attack Vector | LOCAL |
| Attack complexity | LOW |
| Privileges required | NONE |
| User interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality | NONE |
| Integrity impact | NONE |
| Availability impact | HIGH |
| Vector | CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | libvirt | Not affected (8.9.0-r4) |
| Stream | libvirt | Fixed (10.7.0-r0) |
References
- https://access.redhat.com/errata/RHSA-2024:9128
- https://access.redhat.com/security/cve/CVE-2024-8235
- https://bugzilla.redhat.com/show_bug.cgi?id=2308680
- https://lists.libvirt.org/archives/list/[email protected]/thread/X6WOVCL6QF3FQRFIIXL736RFZVSUWLWJ/
- https://security.netapp.com/advisory/ntap-20240920-0006/