First published: Mon Jul 26 2021(Updated: )
A flaw was found in the libvirt virStoragePoolLookupByTargetPath API. The storagePoolLookupByTargetPath() function does not properly release a locked object (virStoragePoolObj) on ACL permission failure. Clients connecting to the read-write socket with limited ACL permissions could use this flaw to acquire the lock and prevent other users from accessing storage pool/volume APIs, resulting in a denial of service condition. Upstream fix: <a href="https://libvirt.org/git/?p=libvirt.git;a=commit;h=447f69dec47e1b0bd15ecd7cd49a9fd3b050fb87">https://libvirt.org/git/?p=libvirt.git;a=commit;h=447f69dec47e1b0bd15ecd7cd49a9fd3b050fb87</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libvirt |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1986094 is moderate due to its potential impact on access control.
To fix REDHAT-BUG-1986094, apply the latest patches released for libvirt that address this vulnerability.
The impact of REDHAT-BUG-1986094 allows clients with limited ACL permissions to exploit a flaw in the virStoragePoolLookupByTargetPath API.
Users and applications utilizing the libvirt API for storage pool management may be affected by REDHAT-BUG-1986094.
Currently, there are no known workarounds for REDHAT-BUG-1986094 other than applying the appropriate security patches.