rpm package
almalinux/libguestfs-benchmarking
pkg:rpm/almalinux/libguestfs-benchmarking
Vulnerabilities (9)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2021-20257 | — | < 1:1.40.2-28.module_el8.5.0+2608+72063365.alma | 1:1.40.2-28.module_el8.5.0+2608+72063365.alma | Mar 16, 2022 | An infinite loop flaw was found in the e1000 NIC emulator of the QEMU. This issue occurs while processing transmits (tx) descriptors in process_tx_desc if various descriptor fields are initialized with invalid values. This flaw allows a guest to consume CPU cycles on the host, re | ||
| CVE-2021-3667 | — | < 1:1.40.2-28.module_el8.5.0+2608+72063365.alma | 1:1.40.2-28.module_el8.5.0+2608+72063365.alma | Mar 2, 2022 | An improper locking issue was found in the virStoragePoolLookupByTargetPath API of libvirt. It occurs in the storagePoolLookupByTargetPath function where a locked virStoragePoolObj object is not properly released on ACL permission failure. Clients connecting to the read-write soc | ||
| CVE-2021-3631 | — | < 1:1.40.2-28.module_el8.5.0+2608+72063365.alma | 1:1.40.2-28.module_el8.5.0+2608+72063365.alma | Mar 2, 2022 | A flaw was found in libvirt while it generates SELinux MCS category pairs for VMs' dynamic labels. This flaw allows one exploited guest to access files labeled for another guest, resulting in the breaking out of sVirt confinement. The highest threat from this vulnerability is to | ||
| CVE-2021-3930 | — | < 1:1.40.2-28.module_el8.5.0+2608+72063365.alma | 1:1.40.2-28.module_el8.5.0+2608+72063365.alma | Feb 18, 2022 | An off-by-one error was found in the SCSI device emulation in QEMU. It could occur while processing MODE SELECT commands in mode_sense_page() if the 'page' argument was set to MODE_PAGE_ALLS (0x3f). A malicious guest could use this flaw to potentially crash QEMU, resulting in a d | ||
| CVE-2021-3595 | — | < 1:1.40.2-28.module_el8.5.0+2608+72063365.alma | 1:1.40.2-28.module_el8.5.0+2608+72063365.alma | Jun 15, 2021 | An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the tftp_input() function and could occur while processing a udp packet that is smaller than the size of the 'tftp_t' structure. This issue may lead to out-of-boun | ||
| CVE-2021-3594 | — | < 1:1.40.2-28.module_el8.5.0+2608+72063365.alma | 1:1.40.2-28.module_el8.5.0+2608+72063365.alma | Jun 15, 2021 | An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the udp_input() function and could occur while processing a udp packet that is smaller than the size of the 'udphdr' structure. This issue may lead to out-of-bound | ||
| CVE-2021-3593 | — | < 1:1.40.2-28.module_el8.5.0+2608+72063365.alma | 1:1.40.2-28.module_el8.5.0+2608+72063365.alma | Jun 15, 2021 | An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the udp6_input() function and could occur while processing a udp packet that is smaller than the size of the 'udphdr' structure. This issue may lead to out-of-boun | ||
| CVE-2021-3592 | — | < 1:1.40.2-28.module_el8.5.0+2608+72063365.alma | 1:1.40.2-28.module_el8.5.0+2608+72063365.alma | Jun 15, 2021 | An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the bootp_input() function and could occur while processing a udp packet that is smaller than the size of the 'bootp_t' structure. A malicious guest could use this | ||
| CVE-2020-15859 | — | < 1:1.40.2-28.module_el8.5.0+2608+72063365.alma | 1:1.40.2-28.module_el8.5.0+2608+72063365.alma | Jul 21, 2020 | QEMU 4.2.0 has a use-after-free in hw/net/e1000e_core.c because a guest OS user can trigger an e1000e packet with the data's address set to the e1000e's MMIO address. |
- CVE-2021-20257Mar 16, 2022affected < 1:1.40.2-28.module_el8.5.0+2608+72063365.almafixed 1:1.40.2-28.module_el8.5.0+2608+72063365.alma
An infinite loop flaw was found in the e1000 NIC emulator of the QEMU. This issue occurs while processing transmits (tx) descriptors in process_tx_desc if various descriptor fields are initialized with invalid values. This flaw allows a guest to consume CPU cycles on the host, re
- CVE-2021-3667Mar 2, 2022affected < 1:1.40.2-28.module_el8.5.0+2608+72063365.almafixed 1:1.40.2-28.module_el8.5.0+2608+72063365.alma
An improper locking issue was found in the virStoragePoolLookupByTargetPath API of libvirt. It occurs in the storagePoolLookupByTargetPath function where a locked virStoragePoolObj object is not properly released on ACL permission failure. Clients connecting to the read-write soc
- CVE-2021-3631Mar 2, 2022affected < 1:1.40.2-28.module_el8.5.0+2608+72063365.almafixed 1:1.40.2-28.module_el8.5.0+2608+72063365.alma
A flaw was found in libvirt while it generates SELinux MCS category pairs for VMs' dynamic labels. This flaw allows one exploited guest to access files labeled for another guest, resulting in the breaking out of sVirt confinement. The highest threat from this vulnerability is to
- CVE-2021-3930Feb 18, 2022affected < 1:1.40.2-28.module_el8.5.0+2608+72063365.almafixed 1:1.40.2-28.module_el8.5.0+2608+72063365.alma
An off-by-one error was found in the SCSI device emulation in QEMU. It could occur while processing MODE SELECT commands in mode_sense_page() if the 'page' argument was set to MODE_PAGE_ALLS (0x3f). A malicious guest could use this flaw to potentially crash QEMU, resulting in a d
- CVE-2021-3595Jun 15, 2021affected < 1:1.40.2-28.module_el8.5.0+2608+72063365.almafixed 1:1.40.2-28.module_el8.5.0+2608+72063365.alma
An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the tftp_input() function and could occur while processing a udp packet that is smaller than the size of the 'tftp_t' structure. This issue may lead to out-of-boun
- CVE-2021-3594Jun 15, 2021affected < 1:1.40.2-28.module_el8.5.0+2608+72063365.almafixed 1:1.40.2-28.module_el8.5.0+2608+72063365.alma
An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the udp_input() function and could occur while processing a udp packet that is smaller than the size of the 'udphdr' structure. This issue may lead to out-of-bound
- CVE-2021-3593Jun 15, 2021affected < 1:1.40.2-28.module_el8.5.0+2608+72063365.almafixed 1:1.40.2-28.module_el8.5.0+2608+72063365.alma
An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the udp6_input() function and could occur while processing a udp packet that is smaller than the size of the 'udphdr' structure. This issue may lead to out-of-boun
- CVE-2021-3592Jun 15, 2021affected < 1:1.40.2-28.module_el8.5.0+2608+72063365.almafixed 1:1.40.2-28.module_el8.5.0+2608+72063365.alma
An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the bootp_input() function and could occur while processing a udp packet that is smaller than the size of the 'bootp_t' structure. A malicious guest could use this
- CVE-2020-15859Jul 21, 2020affected < 1:1.40.2-28.module_el8.5.0+2608+72063365.almafixed 1:1.40.2-28.module_el8.5.0+2608+72063365.alma
QEMU 4.2.0 has a use-after-free in hw/net/e1000e_core.c because a guest OS user can trigger an e1000e packet with the data's address set to the e1000e's MMIO address.