First published: Mon Jul 26 2021(Updated: )
A flaw was found in the libvirt virStoragePoolLookupByTargetPath API. The storagePoolLookupByTargetPath() function does not properly release a locked object (virStoragePoolObj) on ACL permission failure. Clients connecting to the read-write socket with limited ACL permissions could use this flaw to acquire the lock and prevent other users from accessing storage pool/volume APIs, resulting in a denial of service condition. Upstream fix: <a href="https://libvirt.org/git/?p=libvirt.git;a=commit;h=447f69dec47e1b0bd15ecd7cd49a9fd3b050fb87">https://libvirt.org/git/?p=libvirt.git;a=commit;h=447f69dec47e1b0bd15ecd7cd49a9fd3b050fb87</a>
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Libvirt | <=7.5.0 | |
Redhat Enterprise Linux | =8.0 | |
NetApp ONTAP Select Deploy administration utility | ||
debian/libvirt | 7.0.0-3+deb11u3 9.0.0-4+deb12u1 10.7.0-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3667 is an improper locking issue found in the virStoragePoolLookupByTargetPath API of libvirt.
The severity of CVE-2021-3667 is medium with a CVSS score of 6.5.
The affected software versions include libvirt 6.0.0-0ubuntu8.16, libvirt 7.6.0-0ubuntu3, libvirt 7.6.0-1, libvirt 9.0.0-4, libvirt 9.8.0-2, Redhat Libvirt 7.5.0, Redhat Enterprise Linux 8.0, and NetApp ONTAP Select Deploy administration utility.
To fix the vulnerability in libvirt, update to the recommended versions provided for your operating system or package.
More information about CVE-2021-3667 can be found at the following references: [Bugzilla Red Hat](https://bugzilla.redhat.com/show_bug.cgi?id=1986094), [GitLab Commit](https://gitlab.com/libvirt/libvirt/-/commit/447f69dec47e1b0bd15ecd7cd49a9fd3b050fb87), [Gentoo GLSA](https://security.gentoo.org/glsa/202210-06).