【安全公告:UTSA-2022-000386】-【CVE-2021-3975】

公告编号:作者:USRC发布日期:2022/09/23

【统信安全公告:UTSA-2022-000386】-【CVE-2021-3975】


一、漏洞描述

A use-after-free flaw was found in libvirt. The qemuMonitorUnregister() function in qemuProcessHandleMonitorEOF is called using multiple threads without being adequately protected by a monitor lock. This flaw could be triggered by the virConnectGetAllDomainStats API when the guest is shutting down. An unprivileged client with a read-only connection could use this flaw to perform a denial of service attack by causing the libvirt daemon to crash.

 

二、漏洞信息

漏洞编号:CVE-2021-3975

软件包名:libvirt

漏洞评级:中危

CVSS3.1评分:6.5

 

三、受影响UOS版本

服务器1050e、服务器1021e、服务器1020e

 

四、漏洞检测

检测方法如下:

                通过yum info Packagename查看包的版本信息

结果如下:

                版本<6.2.0-20.uel20.01受此漏洞影响,版本>=6.2.0-20.uel20.01此漏洞已修复

 

五、修复建议

                更新源后,使用yum install Packagename安装升级

 

六、修复状态

此漏洞补丁已于2022年8月31日推送至外网仓库源

 

七、修复验证

查看libvirt的版本>=6.2.0-20.uel20.01,说明此漏洞已修复

 

八、相关链接

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3975

https://nvd.nist.gov/vuln/detail/CVE-2021-3975