vulnerability
Alma Linux: CVE-2021-20257: Low: virt:rhel and virt-devel:rhel security update (ALSA-2021-5238)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
2 | (AV:L/AC:L/Au:N/C:N/I:N/A:P) | Mar 16, 2022 | May 4, 2022 | Nov 14, 2024 |
Severity
2
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:P)
Published
Mar 16, 2022
Added
May 4, 2022
Modified
Nov 14, 2024
Description
An infinite loop flaw was found in the e1000 NIC emulator of the QEMU. This issue occurs while processing transmits (tx) descriptors in process_tx_desc if various descriptor fields are initialized with invalid values. This flaw allows a guest to consume CPU cycles on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
Solution(s)
alma-upgrade-hivexalma-upgrade-hivex-develalma-upgrade-libguestfsalma-upgrade-libguestfs-bash-completionalma-upgrade-libguestfs-benchmarkingalma-upgrade-libguestfs-develalma-upgrade-libguestfs-gfs2alma-upgrade-libguestfs-gobjectalma-upgrade-libguestfs-gobject-develalma-upgrade-libguestfs-inspect-iconsalma-upgrade-libguestfs-javaalma-upgrade-libguestfs-java-develalma-upgrade-libguestfs-javadocalma-upgrade-libguestfs-man-pages-jaalma-upgrade-libguestfs-man-pages-ukalma-upgrade-libguestfs-rescuealma-upgrade-libguestfs-rsyncalma-upgrade-libguestfs-toolsalma-upgrade-libguestfs-tools-calma-upgrade-libguestfs-winsupportalma-upgrade-libguestfs-xfsalma-upgrade-libiscsialma-upgrade-libiscsi-develalma-upgrade-libiscsi-utilsalma-upgrade-libnbdalma-upgrade-libnbd-develalma-upgrade-libvirtalma-upgrade-libvirt-adminalma-upgrade-libvirt-bash-completionalma-upgrade-libvirt-clientalma-upgrade-libvirt-daemonalma-upgrade-libvirt-daemon-config-networkalma-upgrade-libvirt-daemon-config-nwfilteralma-upgrade-libvirt-daemon-driver-interfacealma-upgrade-libvirt-daemon-driver-networkalma-upgrade-libvirt-daemon-driver-nodedevalma-upgrade-libvirt-daemon-driver-nwfilteralma-upgrade-libvirt-daemon-driver-qemualma-upgrade-libvirt-daemon-driver-secretalma-upgrade-libvirt-daemon-driver-storagealma-upgrade-libvirt-daemon-driver-storage-corealma-upgrade-libvirt-daemon-driver-storage-diskalma-upgrade-libvirt-daemon-driver-storage-glusteralma-upgrade-libvirt-daemon-driver-storage-iscsialma-upgrade-libvirt-daemon-driver-storage-iscsi-directalma-upgrade-libvirt-daemon-driver-storage-logicalalma-upgrade-libvirt-daemon-driver-storage-mpathalma-upgrade-libvirt-daemon-driver-storage-rbdalma-upgrade-libvirt-daemon-driver-storage-scsialma-upgrade-libvirt-daemon-kvmalma-upgrade-libvirt-dbusalma-upgrade-libvirt-develalma-upgrade-libvirt-docsalma-upgrade-libvirt-libsalma-upgrade-libvirt-lock-sanlockalma-upgrade-libvirt-nssalma-upgrade-lua-guestfsalma-upgrade-nbdfusealma-upgrade-nbdkitalma-upgrade-nbdkit-bash-completionalma-upgrade-nbdkit-basic-filtersalma-upgrade-nbdkit-basic-pluginsalma-upgrade-nbdkit-curl-pluginalma-upgrade-nbdkit-develalma-upgrade-nbdkit-example-pluginsalma-upgrade-nbdkit-gzip-pluginalma-upgrade-nbdkit-linuxdisk-pluginalma-upgrade-nbdkit-python-pluginalma-upgrade-nbdkit-serveralma-upgrade-nbdkit-ssh-pluginalma-upgrade-nbdkit-vddk-pluginalma-upgrade-nbdkit-xz-filteralma-upgrade-netcfalma-upgrade-netcf-develalma-upgrade-netcf-libsalma-upgrade-perl-hivexalma-upgrade-perl-sys-guestfsalma-upgrade-perl-sys-virtalma-upgrade-python3-hivexalma-upgrade-python3-libguestfsalma-upgrade-python3-libnbdalma-upgrade-python3-libvirtalma-upgrade-qemu-guest-agentalma-upgrade-qemu-imgalma-upgrade-qemu-kvmalma-upgrade-qemu-kvm-block-curlalma-upgrade-qemu-kvm-block-glusteralma-upgrade-qemu-kvm-block-iscsialma-upgrade-qemu-kvm-block-rbdalma-upgrade-qemu-kvm-block-sshalma-upgrade-qemu-kvm-commonalma-upgrade-qemu-kvm-corealma-upgrade-ruby-hivexalma-upgrade-ruby-libguestfsalma-upgrade-seabiosalma-upgrade-seabios-binalma-upgrade-seavgabios-binalma-upgrade-sgabiosalma-upgrade-sgabios-binalma-upgrade-superminalma-upgrade-supermin-develalma-upgrade-virt-dibalma-upgrade-virt-v2v

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.