First published: Mon Jul 26 2021(Updated: )
A flaw was found in the libvirt virStoragePoolLookupByTargetPath API. The storagePoolLookupByTargetPath() function does not properly release a locked object (virStoragePoolObj) on ACL permission failure. Clients connecting to the read-write socket with limited ACL permissions could use this flaw to acquire the lock and prevent other users from accessing storage pool/volume APIs, resulting in a denial of service condition. Upstream fix: <a href="https://libvirt.org/git/?p=libvirt.git;a=commit;h=447f69dec47e1b0bd15ecd7cd49a9fd3b050fb87">https://libvirt.org/git/?p=libvirt.git;a=commit;h=447f69dec47e1b0bd15ecd7cd49a9fd3b050fb87</a>
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libvirt | 7.0.0-3+deb11u3 9.0.0-4+deb12u1 10.7.0-3 | |
Red Hat Libvirt-daemon-driver-storage-iscsi-direct | <=7.5.0 | |
Red Hat Enterprise Linux | =8.0 | |
NetApp ONTAP Select Deploy | ||
Red Hat Libvirt-daemon-driver-storage-iscsi-direct | >=4.1.0<=7.5.0 | |
Debian | =10.0 |
https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=447f69dec47e1b0bd15ecd7cd49a9fd3b050fb87
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3667 is an improper locking issue found in the virStoragePoolLookupByTargetPath API of libvirt.
The severity of CVE-2021-3667 is medium with a CVSS score of 6.5.
The affected software versions include libvirt 6.0.0-0ubuntu8.16, libvirt 7.6.0-0ubuntu3, libvirt 7.6.0-1, libvirt 9.0.0-4, libvirt 9.8.0-2, Redhat Libvirt 7.5.0, Redhat Enterprise Linux 8.0, and NetApp ONTAP Select Deploy administration utility.
To fix the vulnerability in libvirt, update to the recommended versions provided for your operating system or package.
More information about CVE-2021-3667 can be found at the following references: [Bugzilla Red Hat](https://bugzilla.redhat.com/show_bug.cgi?id=1986094), [GitLab Commit](https://gitlab.com/libvirt/libvirt/-/commit/447f69dec47e1b0bd15ecd7cd49a9fd3b050fb87), [Gentoo GLSA](https://security.gentoo.org/glsa/202210-06).