Multiple race conditions in the (1) virDomainBlockStats, (2) virDomainGetBlockInf, (3) qemuDomainBlockJobImpl, and (4) virDomainGetBlockIoTune functions in libvirt before 1.2.1 do not properly verify that the disk is attached, which allows remote read-only attackers to cause a denial of service (libvirtd crash) via the virDomainDetachDeviceFlags command.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
http://www.ubuntu.com/usn/USN-2093-1 | vendor advisory |
http://secunia.com/advisories/56446 | third party advisory vendor advisory |
http://www.debian.org/security/2014/dsa-2846 | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1043069 | vendor advisory |
http://libvirt.org/news.html | |
http://secunia.com/advisories/60895 | third party advisory |
http://security.gentoo.org/glsa/glsa-201412-04.xml | vendor advisory |
http://lists.opensuse.org/opensuse-updates/2014-02/msg00060.html | vendor advisory |
http://rhn.redhat.com/errata/RHSA-2014-0103.html | vendor advisory |
http://secunia.com/advisories/56186 | third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-updates/2014-02/msg00062.html | vendor advisory |