First published: Tue Jan 14 2020(Updated: )
A NULL pointer dereference was found in the libvirt API responsible introduced in upstream version 3.10.0, and fixed in libvirt 6.0.0, for fetching a storage pool based on its target path. In more detail, this flaw affects storage pools created without a target path such as network-based pools like gluster and RBD. Unprivileged users with a read-only connection could abuse this flaw to crash the libvirt daemon, resulting in a potential denial of service.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libvirt | <0:4.5.0-36.el7 | 0:4.5.0-36.el7 |
Redhat Libvirt | >=3.10.0<6.0.0 | |
redhat/libvirt | <6.0.0 | 6.0.0 |
ubuntu/libvirt | <4.0.0-1ubuntu8.17 | 4.0.0-1ubuntu8.17 |
ubuntu/libvirt | <5.4.0-0ubuntu5.4 | 5.4.0-0ubuntu5.4 |
ubuntu/libvirt | <6.0.0-2 | 6.0.0-2 |
debian/libvirt | 7.0.0-3+deb11u2 9.0.0-4 10.6.0-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10703 is a vulnerability that involves a NULL pointer dereference in the libvirt API responsible for fetching a storage pool based on its target path.
CVE-2020-10703 has a severity rating of 6.5 (medium).
This vulnerability affects libvirt versions up to and including 6.0.0 on Red Hat, Debian, and Ubuntu systems.
To fix CVE-2020-10703, you should update libvirt to version 6.0.0 or higher.
You can find more information about CVE-2020-10703 on the Red Hat Bugzilla and libvirt websites.