ALT-PU-2021-1965-1
Closed vulnerabilities
BDU:2020-03920
Уязвимость библиотеки управления виртуализацией Libvirt, связанная с неправильным присвоением разрешений для критичного ресурса, позволяющая нарушителю повысить свои привилегии
BDU:2021-03736
Уязвимость демона для управления виртуализацией Libvirt, связанная с повторным освобождением памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-04130
Уязвимость демона и набора инструментов для управления виртуализацией libvirt, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-04592
Уязвимость библиотеки управления виртуализацией Libvirt, связанная с ошибками авторизации, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05833
Уязвимость функции qemuDomainGetStatsIOThread компонента qemu_driver.c библиотеки управления виртуализацией Libvirt, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-20485
qemu/qemu_driver.c in libvirt before 6.0.0 mishandles the holding of a monitor job during a query to a guest agent, which allows attackers to cause a denial of service (API blockage).
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953078
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953078
- https://bugzilla.redhat.com/show_bug.cgi?id=1809740
- https://bugzilla.redhat.com/show_bug.cgi?id=1809740
- https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=a663a860819287e041c3de672aad1d8543098ecc
- https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=a663a860819287e041c3de672aad1d8543098ecc
- FEDORA-2020-5cd83efda7
- FEDORA-2020-5cd83efda7
- https://security-tracker.debian.org/tracker/CVE-2019-20485
- https://security-tracker.debian.org/tracker/CVE-2019-20485
- https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1730509.html
- https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1730509.html
Modified: 2024-11-21
CVE-2020-10701
A missing authorization flaw was found in the libvirt API responsible for changing the QEMU agent response timeout. This flaw allows read-only connections to adjust the time that libvirt waits for the QEMU guest agent to respond to agent commands. Depending on the timeout value that is set, this flaw can make guest agent commands fail because the agent cannot respond in time. Unprivileged users with a read-only connection could abuse this flaw to set the response timeout for all guest agent messages to zero, potentially leading to a denial of service. This flaw affects libvirt versions before 6.2.0.
Modified: 2024-11-21
CVE-2020-10703
A NULL pointer dereference was found in the libvirt API responsible introduced in upstream version 3.10.0, and fixed in libvirt 6.0.0, for fetching a storage pool based on its target path. In more detail, this flaw affects storage pools created without a target path such as network-based pools like gluster and RBD. Unprivileged users with a read-only connection could abuse this flaw to crash the libvirt daemon, resulting in a potential denial of service.
- https://bugzilla.redhat.com/show_bug.cgi?id=1790725
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10703
- https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=5d5c732d748d644ec14626bce448e84bdc4bd93e
- https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=7aa0e8c0cb8a6293d0c6f7e3d29c13b96dec2129
- https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=dfff16a7c261f8d28e3abe60a47165f845fa952f
- [debian-lts-announce] 20240401 [SECURITY] [DLA 3778-1] libvirt security update
- FEDORA-2020-5cd83efda7
- https://security.netapp.com/advisory/ntap-20200608-0005/
- https://bugzilla.redhat.com/show_bug.cgi?id=1790725
- https://security.netapp.com/advisory/ntap-20200608-0005/
- FEDORA-2020-5cd83efda7
- [debian-lts-announce] 20240401 [SECURITY] [DLA 3778-1] libvirt security update
- https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=dfff16a7c261f8d28e3abe60a47165f845fa952f
- https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=7aa0e8c0cb8a6293d0c6f7e3d29c13b96dec2129
- https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=5d5c732d748d644ec14626bce448e84bdc4bd93e
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10703
Modified: 2024-11-21
CVE-2020-12430
An issue was discovered in qemuDomainGetStatsIOThread in qemu/qemu_driver.c in libvirt 4.10.0 though 6.x before 6.1.0. A memory leak was found in the virDomainListGetStats libvirt API that is responsible for retrieving domain statistics when managing QEMU guests. This flaw allows unprivileged users with a read-only connection to cause a memory leak in the domstats command, resulting in a potential denial of service.
- https://bugzilla.redhat.com/show_bug.cgi?id=1804548
- https://bugzilla.redhat.com/show_bug.cgi?id=1828190
- https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=9bf9e0ae6af38c806f4672ca7b12a6b38d5a9581
- [debian-lts-announce] 20240401 [SECURITY] [DLA 3778-1] libvirt security update
- FEDORA-2020-5cd83efda7
- https://security.netapp.com/advisory/ntap-20200518-0003/
- USN-4371-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1804548
- USN-4371-1
- https://security.netapp.com/advisory/ntap-20200518-0003/
- FEDORA-2020-5cd83efda7
- [debian-lts-announce] 20240401 [SECURITY] [DLA 3778-1] libvirt security update
- https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=9bf9e0ae6af38c806f4672ca7b12a6b38d5a9581
- https://bugzilla.redhat.com/show_bug.cgi?id=1828190
Modified: 2024-11-21
CVE-2020-14339
A flaw was found in libvirt, where it leaked a file descriptor for `/dev/mapper/control` into the QEMU process. This file descriptor allows for privileged operations to happen against the device-mapper on the host. This flaw allows a malicious guest user or process to perform operations outside of their standard permissions, potentially causing serious damage to the host operating system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Modified: 2024-11-21
CVE-2020-15708
Ubuntu's packaging of libvirt in 20.04 LTS created a control socket with world read and write permissions. An attacker could use this to overwrite arbitrary files or execute arbitrary code.
Modified: 2024-11-21
CVE-2020-25637
A double free memory issue was found to occur in the libvirt API, in versions before 6.8.0, responsible for requesting information about network interfaces of a running QEMU domain. This flaw affects the polkit access control driver. Specifically, clients connecting to the read-write socket with limited ACL permissions could use this flaw to crash the libvirt daemon, resulting in a denial of service, or potentially escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
- openSUSE-SU-2020:1778
- openSUSE-SU-2020:1778
- openSUSE-SU-2020:1777
- openSUSE-SU-2020:1777
- https://bugzilla.redhat.com/show_bug.cgi?id=1881037
- https://bugzilla.redhat.com/show_bug.cgi?id=1881037
- [debian-lts-announce] 20240401 [SECURITY] [DLA 3778-1] libvirt security update
- [debian-lts-announce] 20240401 [SECURITY] [DLA 3778-1] libvirt security update
- GLSA-202210-06
- GLSA-202210-06
Modified: 2024-11-21
CVE-2021-3975
A use-after-free flaw was found in libvirt. The qemuMonitorUnregister() function in qemuProcessHandleMonitorEOF is called using multiple threads without being adequately protected by a monitor lock. This flaw could be triggered by the virConnectGetAllDomainStats API when the guest is shutting down. An unprivileged client with a read-only connection could use this flaw to perform a denial of service attack by causing the libvirt daemon to crash.
- https://access.redhat.com/security/cve/CVE-2021-3975
- https://access.redhat.com/security/cve/CVE-2021-3975
- https://bugzilla.redhat.com/show_bug.cgi?id=2024326
- https://bugzilla.redhat.com/show_bug.cgi?id=2024326
- https://github.com/libvirt/libvirt/commit/1ac703a7d0789e46833f4013a3876c2e3af18ec7
- https://github.com/libvirt/libvirt/commit/1ac703a7d0789e46833f4013a3876c2e3af18ec7
- [debian-lts-announce] 20240401 [SECURITY] [DLA 3778-1] libvirt security update
- [debian-lts-announce] 20240401 [SECURITY] [DLA 3778-1] libvirt security update
- https://security.netapp.com/advisory/ntap-20221201-0002/
- https://security.netapp.com/advisory/ntap-20221201-0002/
- https://ubuntu.com/security/CVE-2021-3975
- https://ubuntu.com/security/CVE-2021-3975