vulnerability
Red Hat: CVE-2019-3840: Moderate: libvirt security, bug fix, and enhancement update (RHSA-2019:2294)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
4 | (AV:N/AC:M/Au:S/C:N/I:N/A:P) | 2019-03-27 | 2019-08-07 | 2021-03-03 |
Severity
4
CVSS
(AV:N/AC:M/Au:S/C:N/I:N/A:P)
Published
2019-03-27
Added
2019-08-07
Modified
2021-03-03
Description
A NULL pointer dereference flaw was discovered in libvirt before version 5.0.0 in the way it gets interface information through the QEMU agent. An attacker in a guest VM can use this flaw to crash libvirtd and cause a denial of service.
Solution(s)
redhat-upgrade-libvirtredhat-upgrade-libvirt-adminredhat-upgrade-libvirt-bash-completionredhat-upgrade-libvirt-clientredhat-upgrade-libvirt-daemonredhat-upgrade-libvirt-daemon-config-networkredhat-upgrade-libvirt-daemon-config-nwfilterredhat-upgrade-libvirt-daemon-driver-interfaceredhat-upgrade-libvirt-daemon-driver-lxcredhat-upgrade-libvirt-daemon-driver-networkredhat-upgrade-libvirt-daemon-driver-nodedevredhat-upgrade-libvirt-daemon-driver-nwfilterredhat-upgrade-libvirt-daemon-driver-qemuredhat-upgrade-libvirt-daemon-driver-secretredhat-upgrade-libvirt-daemon-driver-storageredhat-upgrade-libvirt-daemon-driver-storage-coreredhat-upgrade-libvirt-daemon-driver-storage-diskredhat-upgrade-libvirt-daemon-driver-storage-glusterredhat-upgrade-libvirt-daemon-driver-storage-iscsiredhat-upgrade-libvirt-daemon-driver-storage-logicalredhat-upgrade-libvirt-daemon-driver-storage-mpathredhat-upgrade-libvirt-daemon-driver-storage-rbdredhat-upgrade-libvirt-daemon-driver-storage-scsiredhat-upgrade-libvirt-daemon-kvmredhat-upgrade-libvirt-daemon-lxcredhat-upgrade-libvirt-debuginforedhat-upgrade-libvirt-develredhat-upgrade-libvirt-docsredhat-upgrade-libvirt-libsredhat-upgrade-libvirt-lock-sanlockredhat-upgrade-libvirt-login-shellredhat-upgrade-libvirt-nss
References

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.