Libvirt Security Notice: LSN-2013-0017
    libvirtd daemon crash when reading memory tunables for LXC guest in shutoff status
    Lifecycle
    
      
        | Reported on: | 
        20131209 | 
      
      
        | Published on: | 
        20131220 | 
      
      
        | Fixed on: | 
        20131220 | 
      
    
    Credits
    
    See also
    
    Description
    
The lxcDomainGetMemoryParameters method in the LXC driver did not check
whether the guest being accessed was running or not. When shutoff there will be
no virCgroupPtr instance associated with the guest. Reading memory tunables
involves calling methods with the virCgroupPtr object as a parameter. This will
lead to a crash accessing a NULL pointer.
  
    Impact
    
A user who has permission to invoke the virDomainGetMemoryParameters
API against the LXC driver will be able to crash the libvirtd daemon. Access to
this API is granted to any user who connects to the read-only libvirtd UNIX
domain socket. If ACLs are active, access is granted to any user with the
'read' permission on the 'domain' object, which is granted by default to all
users. As a result an unprivileged user will be able to inflict a denial of
service attack on other users of the libvirtd daemon with higher privilege.
  
    Workaround
    
The impact can be mitigated by blocking access to the read-only
libvirtd UNIX domain socket, with policykit or the 'auth_unix_ro' parameter
in '/etc/libvirt/libvirtd.conf'. If ACLs are active, the 'read' permission
should be removed from any untrusted users. This will not prevent the crash,
but will stop unprivileged users from inflicting the denial of service
on higher privileged users.
  
    Affected product: libvirt
    
    
    
    
    
    
    
    
    
    
    
      Alternative formats:
      [xml] [text]