Out-of-bounds Read Affecting libguestfs-rsync package, versions <1:1.40.2-25.0.1.module+el8.3.0+7860+a7792d29
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-ORACLE8-LIBGUESTFSRSYNC-2581548
- published 10 Apr 2022
- disclosed 1 Apr 2022
Introduced: 1 Apr 2022
CVE-2021-20295 Open this link in a new tabHow to fix?
Upgrade Oracle:8 libguestfs-rsync to version 1:1.40.2-25.0.1.module+el8.3.0+7860+a7792d29 or higher.
This issue was patched in ELSA-2021-1064.
NVD Description
Note: Versions mentioned in the description apply only to the upstream libguestfs-rsync package and not the libguestfs-rsync package as distributed by Oracle.
See How to fix? for Oracle:8 relevant fixed versions and status.
It was discovered that the update for the virt:rhel module in the RHSA-2020:4676 (https://access.redhat.com/errata/RHSA-2020:4676) erratum released as part of Red Hat Enterprise Linux 8.3 failed to include the fix for the qemu-kvm component issue CVE-2020-10756, which was previously corrected in virt:rhel/qemu-kvm via erratum RHSA-2020:4059 (https://access.redhat.com/errata/RHSA-2020:4059). CVE-2021-20295 was assigned to that Red Hat specific security regression. For more details about the original security issue CVE-2020-10756, refer to bug 1835986 or the CVE page: https://access.redhat.com/security/cve/CVE-2020-10756.