NULL Pointer Dereference Affecting libvirt-daemon-proxy package, versions <0:10.5.0-7.el9_5.alma.1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-ALMALINUX9-LIBVIRTDAEMONPROXY-8383629
- published 18 Nov 2024
- disclosed 12 Nov 2024
Introduced: 12 Nov 2024
New CVE-2024-8235 Open this link in a new tabHow to fix?
Upgrade AlmaLinux:9
libvirt-daemon-proxy
to version 0:10.5.0-7.el9_5.alma.1 or higher.
This issue was patched in ALSA-2024:9128
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream libvirt-daemon-proxy
package and not the libvirt-daemon-proxy
package as distributed by AlmaLinux
.
See How to fix?
for AlmaLinux:9
relevant fixed versions and status.
A flaw was found in libvirt. A refactor of the code fetching the list of interfaces for multiple APIs introduced a corner case on platforms where allocating 0 bytes of memory results in a NULL pointer. This corner case would lead to a NULL-pointer dereference and subsequent crash of virtinterfaced. This issue could allow clients connecting to the read-only socket to crash the virtinterfaced daemon.
References
- https://errata.almalinux.org/9/ALSA-2024-9128.html
- https://access.redhat.com/security/cve/CVE-2024-8235
- https://access.redhat.com/errata/RHSA-2024:9128
- https://bugzilla.redhat.com/show_bug.cgi?id=2308680
- https://lists.libvirt.org/archives/list/devel@lists.libvirt.org/thread/X6WOVCL6QF3FQRFIIXL736RFZVSUWLWJ/
- https://security.netapp.com/advisory/ntap-20240920-0006/