Vulnerability Details CVE-2021-3667
An improper locking issue was found in the virStoragePoolLookupByTargetPath API of libvirt. It occurs in the storagePoolLookupByTargetPath function where a locked virStoragePoolObj object is not properly released on ACL permission failure. Clients connecting to the read-write socket with limited ACL permissions could use this flaw to acquire the lock and prevent other users from accessing storage pool/volume APIs, resulting in a denial of service condition. The highest threat from this vulnerability is to system availability.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 50.0%
CVSS Severity
CVSS v3 Score 6.5
CVSS v2 Score 3.5
Products affected by CVE-2021-3667
-
cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-
-
cpe:2.3:a:redhat:libvirt:4.1.0
-
cpe:2.3:a:redhat:libvirt:4.10.0
-
cpe:2.3:a:redhat:libvirt:4.2.0
-
cpe:2.3:a:redhat:libvirt:4.3.0
-
cpe:2.3:a:redhat:libvirt:4.4.0
-
cpe:2.3:a:redhat:libvirt:4.5.0
-
cpe:2.3:a:redhat:libvirt:4.6.0
-
cpe:2.3:a:redhat:libvirt:4.7.0
-
cpe:2.3:a:redhat:libvirt:4.8.0
-
cpe:2.3:a:redhat:libvirt:4.9.0
-
cpe:2.3:a:redhat:libvirt:5.0.0
-
cpe:2.3:a:redhat:libvirt:5.1.0
-
cpe:2.3:a:redhat:libvirt:5.10.0
-
cpe:2.3:a:redhat:libvirt:5.2.0
-
cpe:2.3:a:redhat:libvirt:5.3.0
-
cpe:2.3:a:redhat:libvirt:5.4.0
-
cpe:2.3:a:redhat:libvirt:5.5.0
-
cpe:2.3:a:redhat:libvirt:5.6.0
-
cpe:2.3:a:redhat:libvirt:5.7.0
-
cpe:2.3:a:redhat:libvirt:5.8.0
-
cpe:2.3:a:redhat:libvirt:5.9.0
-
cpe:2.3:a:redhat:libvirt:6.0.0
-
cpe:2.3:a:redhat:libvirt:6.1.0
-
cpe:2.3:a:redhat:libvirt:6.10.0
-
cpe:2.3:a:redhat:libvirt:6.2.0
-
cpe:2.3:a:redhat:libvirt:6.3.0
-
cpe:2.3:a:redhat:libvirt:6.4.0
-
cpe:2.3:a:redhat:libvirt:6.5.0
-
cpe:2.3:a:redhat:libvirt:6.6.0
-
cpe:2.3:a:redhat:libvirt:6.7.0
-
cpe:2.3:a:redhat:libvirt:6.8.0
-
cpe:2.3:a:redhat:libvirt:6.9.0
-
cpe:2.3:a:redhat:libvirt:7.0.0
-
cpe:2.3:a:redhat:libvirt:7.1.0
-
cpe:2.3:a:redhat:libvirt:7.2.0
-
cpe:2.3:a:redhat:libvirt:7.3.0
-
cpe:2.3:a:redhat:libvirt:7.4.0
-
cpe:2.3:a:redhat:libvirt:7.5.0
-
cpe:2.3:o:debian:debian_linux:10.0
-
cpe:2.3:o:redhat:enterprise_linux:8.0