Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-3750— Libvirt: improper locking in virstoragepoolobjlistsearch may lead to denial of service

CVSS 6.5 · Medium EPSS 0.11% · P30
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-3750

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Libvirt: improper locking in virstoragepoolobjlistsearch may lead to denial of service
Source: NVD (National Vulnerability Database)
Vulnerability Description
A flaw was found in libvirt. The virStoragePoolObjListSearch function does not return a locked pool as expected, resulting in a race condition and denial of service when attempting to lock the same object from another thread. This issue could allow clients connecting to the read-only socket to crash the libvirt daemon.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
加锁机制不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Red Hat libvirt 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Red Hat libvirt是美国红帽(Red Hat)公司的一个用于实现Linux虚拟化功能的Linux API,它支持各种Hypervisor,包括Xen和KVM,以及QEMU和用于其他操作系统的一些虚拟产品。 Red Hat libvirt存在安全漏洞,该漏洞源于不会按预期返回锁定池,从而在尝试从另一个线程锁定同一对象时导致竞争条件和拒绝服务。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Red HatRed Hat Enterprise Linux 9 0:9.5.0-7.el9_3 ~ * cpe:/a:redhat:enterprise_linux:9::appstream
Red HatRed Hat Enterprise Linux 6-cpe:/o:redhat:enterprise_linux:6
Red HatRed Hat Enterprise Linux 7-cpe:/o:redhat:enterprise_linux:7
Red HatRed Hat Enterprise Linux 8-cpe:/o:redhat:enterprise_linux:8
Red HatRed Hat Enterprise Linux 8 Advanced Virtualization-cpe:/a:redhat:advanced_virtualization:8::el8

II. Public POCs for CVE-2023-3750

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-3750

登录查看更多情报信息。

Same Patch Batch · Red Hat · 2023-07-24 · 10 CVEs total

CVE-2023-38127.8 HIGHKernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags
CVE-2023-382007.5 HIGHKeylime: registrar is subject to a dos against ssl connections
CVE-2023-35677.1 HIGHKernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race
CVE-2023-36407.0 HIGHKernel: x86/mm: a per-cpu entry area leak was identified through the init_cea_offsets func
CVE-2023-339526.7 MEDIUMKernel: vmwgfx: double free within the handling of vmw_buffer_object objects
CVE-2023-339516.7 MEDIUMKernel: vmwgfx: race condition leading to information disclosure vulnerability
CVE-2023-30196.0 MEDIUMQemu: e1000e: heap use-after-free in e1000e_write_packet_to_guest()
CVE-2023-37455.5 MEDIUMImagemagick: heap-buffer-overflow in pushcharpixel() in quantum-private.h
CVE-2023-33845.4 MEDIUMQuay: stored cross site scripting

IV. Related Vulnerabilities

V. Comments for CVE-2023-3750

No comments yet


Leave a comment