First published: Wed Jul 12 2023(Updated: )
A flaw was found in libvirt. The virStoragePoolObjListSearch function does not return a locked pool as expected, resulting in a race condition and denial of service when attempting to lock the same object from another thread. This issue could allow clients connecting to the read-only socket to crash the libvirt daemon.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Libvirt | ||
Redhat Enterprise Linux | =9.0 | |
ubuntu/libvirt | <9.0.0-2ubuntu1.2 | 9.0.0-2ubuntu1.2 |
debian/libvirt | <=9.0.0-4 | 5.0.0-4+deb10u1 7.0.0-3+deb11u2 9.7.0-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3750 is a vulnerability in the libvirt component that can lead to a denial of service (DoS) attack due to improper locking in the virStoragePoolObjListSearch function.
The severity of CVE-2023-3750 is medium, with a severity value of 5.3.
Redhat Libvirt and Redhat Enterprise Linux versions 9.0 and Ubuntu libvirt version 9.0.0-2ubuntu1.2 are affected by CVE-2023-3750.
CVE-2023-3750 can be exploited when attempting to lock the same object from another thread, resulting in a race condition and denial of service.
You can find more information about CVE-2023-3750 at the following references: [Red Hat Security Advisory](https://access.redhat.com/security/cve/CVE-2023-3750), [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=2222210), [Ubuntu Launchpad](https://launchpad.net/bugs/cve/CVE-2023-3750)