Red Hat Enterprise Linux 7 update for libvirt



Published: 1970-01-01 | Updated: 2020-09-30
Risk Medium
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2019-20485
CVE-2020-10703
CWE-ID CWE-399
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
libvirt (Red Hat package)
Operating systems & Components / Operating system package or component

Vendor Red Hat Inc.

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Resource management error

EUVDB-ID: #VU27545

Risk: Medium

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-20485

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper management of internal resources with the qemu/qemu_driver.c in libvirt while holding of a monitor job during a query to a guest agent, which allows attackers to cause a denial of service (API blockage).

Mitigation

Install updates from vendor's website.

Vulnerable software versions

libvirt (Red Hat package): 4.5.0-10.el7 - 4.5.0-23.el7_7

External links

http://access.redhat.com/errata/RHSA-2020:4000


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Resource management error

EUVDB-ID: #VU28191

Risk: Low

CVSSv3.1: 2.4 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-10703

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper management of internal resources with the application when performing pool lookups within the storagePoolLookupByTargetPath() function in storage/storage_driver.c. A remote user can create a pool with empty target path and then perform  search for an empty target, which results in libvirt crash.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

libvirt (Red Hat package): 4.5.0-10.el7 - 4.5.0-23.el7_7

External links

http://access.redhat.com/errata/RHSA-2020:4000


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###