Out-of-Bounds The advisory has been revoked - it doesn't affect any version of package libvirt-daemon-driver-storage-gluster  (opens in a new tab)


Threat Intelligence

EPSS
0.08% (38th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL8-LIBVIRTDAEMONDRIVERSTORAGEGLUSTER-1889983
  • published1 Nov 2021
  • disclosed2 Dec 2020

Introduced: 2 Dec 2020

CVE-2021-3559  (opens in a new tab)
CWE-119  (opens in a new tab)

Amendment

The Red Hat security team deemed this advisory irrelevant for RHEL:8.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libvirt-daemon-driver-storage-gluster package and not the libvirt-daemon-driver-storage-gluster package as distributed by RHEL.

A flaw was found in libvirt in the virConnectListAllNodeDevices API in versions before 7.0.0. It only affects hosts with a PCI device and driver that supports mediated devices (e.g., GRID driver). This flaw could be used by an unprivileged client with a read-only connection to crash the libvirt daemon by executing the 'nodedev-list' virsh command. The highest threat from this vulnerability is to system availability.