A NULL pointer dereference was found in the libvirt API responsible introduced in upstream version 3.10.0, and fixed in libvirt 6.0.0, for fetching a storage pool based on its target path. In more detail, this flaw affects storage pools created without a target path such as network-based pools like gluster and RBD. Unprivileged users with a read-only connection could abuse this flaw to crash the libvirt daemon, resulting in a potential denial of service.
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "libnss-libvirt",
"binary_version": "4.0.0-1ubuntu8.17"
},
{
"binary_name": "libvirt-bin",
"binary_version": "4.0.0-1ubuntu8.17"
},
{
"binary_name": "libvirt-clients",
"binary_version": "4.0.0-1ubuntu8.17"
},
{
"binary_name": "libvirt-daemon",
"binary_version": "4.0.0-1ubuntu8.17"
},
{
"binary_name": "libvirt-daemon-driver-storage-gluster",
"binary_version": "4.0.0-1ubuntu8.17"
},
{
"binary_name": "libvirt-daemon-driver-storage-rbd",
"binary_version": "4.0.0-1ubuntu8.17"
},
{
"binary_name": "libvirt-daemon-driver-storage-sheepdog",
"binary_version": "4.0.0-1ubuntu8.17"
},
{
"binary_name": "libvirt-daemon-driver-storage-zfs",
"binary_version": "4.0.0-1ubuntu8.17"
},
{
"binary_name": "libvirt-daemon-system",
"binary_version": "4.0.0-1ubuntu8.17"
},
{
"binary_name": "libvirt-dev",
"binary_version": "4.0.0-1ubuntu8.17"
},
{
"binary_name": "libvirt-sanlock",
"binary_version": "4.0.0-1ubuntu8.17"
},
{
"binary_name": "libvirt-wireshark",
"binary_version": "4.0.0-1ubuntu8.17"
},
{
"binary_name": "libvirt0",
"binary_version": "4.0.0-1ubuntu8.17"
}
]
}