An improper locking issue was found in the virStoragePoolLookupByTargetPath API of libvirt. It occurs in the storagePoolLookupByTargetPath function where a locked virStoragePoolObj object is not properly released on ACL permission failure. Clients connecting to the read-write socket with limited ACL permissions could use this flaw to acquire the lock and prevent other users from accessing storage pool/volume APIs, resulting in a denial of service condition. The highest threat from this vulnerability is to system availability.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
10 Feb 2025, 13:10
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | |
References | () https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=447f69dec47e1b0bd15ecd7cd49a9fd3b050fb87 - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html - Mailing List, Third Party Advisory | |
First Time |
Debian debian Linux
Debian |
Information
Published : 2022-03-02 23:15
Updated : 2025-02-10 13:10
NVD link : CVE-2021-3667
Mitre link : CVE-2021-3667
CVE.ORG link : CVE-2021-3667
JSON object : View
Products Affected
redhat
- enterprise_linux
- libvirt
netapp
- ontap_select_deploy_administration_utility
debian
- debian_linux
CWE
CWE-667
Improper Locking