VYPR

rpm package

almalinux/libguestfs-benchmarking

pkg:rpm/almalinux/libguestfs-benchmarking

Vulnerabilities (9)

  • CVE-2021-20257Mar 16, 2022
    affected < 1:1.40.2-28.module_el8.5.0+2608+72063365.almafixed 1:1.40.2-28.module_el8.5.0+2608+72063365.alma

    An infinite loop flaw was found in the e1000 NIC emulator of the QEMU. This issue occurs while processing transmits (tx) descriptors in process_tx_desc if various descriptor fields are initialized with invalid values. This flaw allows a guest to consume CPU cycles on the host, re

  • CVE-2021-3667Mar 2, 2022
    affected < 1:1.40.2-28.module_el8.5.0+2608+72063365.almafixed 1:1.40.2-28.module_el8.5.0+2608+72063365.alma

    An improper locking issue was found in the virStoragePoolLookupByTargetPath API of libvirt. It occurs in the storagePoolLookupByTargetPath function where a locked virStoragePoolObj object is not properly released on ACL permission failure. Clients connecting to the read-write soc

  • CVE-2021-3631Mar 2, 2022
    affected < 1:1.40.2-28.module_el8.5.0+2608+72063365.almafixed 1:1.40.2-28.module_el8.5.0+2608+72063365.alma

    A flaw was found in libvirt while it generates SELinux MCS category pairs for VMs' dynamic labels. This flaw allows one exploited guest to access files labeled for another guest, resulting in the breaking out of sVirt confinement. The highest threat from this vulnerability is to

  • CVE-2021-3930Feb 18, 2022
    affected < 1:1.40.2-28.module_el8.5.0+2608+72063365.almafixed 1:1.40.2-28.module_el8.5.0+2608+72063365.alma

    An off-by-one error was found in the SCSI device emulation in QEMU. It could occur while processing MODE SELECT commands in mode_sense_page() if the 'page' argument was set to MODE_PAGE_ALLS (0x3f). A malicious guest could use this flaw to potentially crash QEMU, resulting in a d

  • CVE-2021-3595Jun 15, 2021
    affected < 1:1.40.2-28.module_el8.5.0+2608+72063365.almafixed 1:1.40.2-28.module_el8.5.0+2608+72063365.alma

    An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the tftp_input() function and could occur while processing a udp packet that is smaller than the size of the 'tftp_t' structure. This issue may lead to out-of-boun

  • CVE-2021-3594Jun 15, 2021
    affected < 1:1.40.2-28.module_el8.5.0+2608+72063365.almafixed 1:1.40.2-28.module_el8.5.0+2608+72063365.alma

    An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the udp_input() function and could occur while processing a udp packet that is smaller than the size of the 'udphdr' structure. This issue may lead to out-of-bound

  • CVE-2021-3593Jun 15, 2021
    affected < 1:1.40.2-28.module_el8.5.0+2608+72063365.almafixed 1:1.40.2-28.module_el8.5.0+2608+72063365.alma

    An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the udp6_input() function and could occur while processing a udp packet that is smaller than the size of the 'udphdr' structure. This issue may lead to out-of-boun

  • CVE-2021-3592Jun 15, 2021
    affected < 1:1.40.2-28.module_el8.5.0+2608+72063365.almafixed 1:1.40.2-28.module_el8.5.0+2608+72063365.alma

    An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the bootp_input() function and could occur while processing a udp packet that is smaller than the size of the 'bootp_t' structure. A malicious guest could use this

  • CVE-2020-15859Jul 21, 2020
    affected < 1:1.40.2-28.module_el8.5.0+2608+72063365.almafixed 1:1.40.2-28.module_el8.5.0+2608+72063365.alma

    QEMU 4.2.0 has a use-after-free in hw/net/e1000e_core.c because a guest OS user can trigger an e1000e packet with the data's address set to the e1000e's MMIO address.