First published: Thu Dec 05 2019(Updated: )
qemu/qemu_driver.c in libvirt before 6.0.0 mishandles the holding of a monitor job during a query to a guest agent, which allows attackers to cause a denial of service (API blockage).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libvirt | <0:4.5.0-36.el7 | 0:4.5.0-36.el7 |
debian/libvirt | <=5.6.0-2<=5.6.0-3 | |
Redhat Libvirt | <6.0.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =31 | |
redhat/libvirt | <6.0.0 | 6.0.0 |
debian/libvirt | 7.0.0-3+deb11u2 9.0.0-4 10.5.0-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-20485 is a vulnerability found in libvirt where the libvirtd daemon can be blocked indefinitely by a malicious guest-agent.
CVE-2019-20485 affects libvirt by allowing a malicious guest-agent to block the libvirtd daemon indefinitely.
CVE-2019-20485 has a severity rating of 5.8 (High).
To fix CVE-2019-20485, update libvirt to version 6.0.0 or higher.
You can find more information about CVE-2019-20485 at the following references: [link1], [link2], [link3].