virt-devel:rhel/libiscsi-utils vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the virt-devel:rhel/libiscsi-utils package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
CVE-2019-11135

<0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea
  • M
Out-of-bounds Read

<0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea
  • L
Use of Uninitialized Resource

<0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea
  • L
Integer Underflow

<0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea
  • L
NULL Pointer Dereference

<0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea
  • M
Improper Check for Dropped Privileges

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • M
Improper Locking

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • M
Incorrect Permission Assignment for Critical Resource

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • M
Access of Uninitialized Pointer

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • M
Access of Uninitialized Pointer

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • M
Access of Uninitialized Pointer

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • M
Access of Uninitialized Pointer

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • M
Use After Free

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • H
Improper Privilege Management

<0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea
  • H
Out-of-bounds Write

<0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea
  • M
Unchecked Return Value

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • M
NULL Pointer Dereference

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • M
NULL Pointer Dereference

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • M
Use After Free

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • M
Out-of-bounds Write

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • M
Out-of-bounds Write

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • M
Out-of-bounds Write

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • M
Out-of-bounds Write

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • M
Out-of-bounds Write

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • M
Out-of-bounds Read

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • M
Uncontrolled Recursion

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • M
Out-of-bounds Write

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • M
Out-of-bounds Read

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • M
Integer Overflow or Wraparound

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • M
Out-of-bounds Read

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • M
Out-of-bounds Read

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • M
NULL Pointer Dereference

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • M
Use After Free

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • M
CVE-2021-3716

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • M
Resource Exhaustion

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • M
Out-of-bounds Write

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • M
Out-of-bounds Write

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • M
Out-of-bounds Write

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • M
Out-of-bounds Write

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • M
Out-of-bounds Write

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • M
Out-of-bounds Write

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • M
Out-of-bounds Write

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • M
Out-of-bounds Write

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • M
NULL Pointer Dereference

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • M
Out-of-bounds Read

<0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea
  • M
Out-of-bounds Read

<0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea
  • M
Out-of-bounds Read

<0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea
  • M
Out-of-bounds Write

<0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea
  • M
Reachable Assertion

<0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea
  • M
CVE-2020-25707

<0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea
  • M
Double Free

<0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea
  • M
Reachable Assertion

<0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea
  • M
Out-of-bounds Read

<0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea
  • H
Out-of-bounds Read

<0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea
  • M
Out-of-bounds Read

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • M
Out-of-bounds Read

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • M
Reachable Assertion

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • M
Out-of-Bounds

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • L
Off-by-one Error

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:1.18.0-8.module_el8.6.0+2880+7d9e3703
  • H
Memory Leak

<0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea
  • H
Buffer Overflow

<0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea
  • H
Out-of-bounds Read

<0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea
  • H
Out-of-bounds Write

<0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea
  • M
Use After Free

<0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea
  • M
Missing Release of Resource after Effective Lifetime

<0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea
  • M
NULL Pointer Dereference

<0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea
  • M
Improper Input Validation

<0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea
  • M
Use After Free

<0:1.18.0-8.module_el8.3.0+2048+e7a0a3ea