Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2021-3975 |
CWE-ID | CWE-416 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
openEuler Operating systems & Components / Operating system libvirt-daemon-driver-storage-iscsi Operating systems & Components / Operating system package or component libvirt-wireshark Operating systems & Components / Operating system package or component libvirt-nss Operating systems & Components / Operating system package or component libvirt-daemon-driver-nodedev Operating systems & Components / Operating system package or component libvirt-docs Operating systems & Components / Operating system package or component libvirt-debuginfo Operating systems & Components / Operating system package or component libvirt-daemon-driver-nwfilter Operating systems & Components / Operating system package or component libvirt-bash-completion Operating systems & Components / Operating system package or component libvirt-daemon-config-network Operating systems & Components / Operating system package or component libvirt-daemon-driver-storage-logical Operating systems & Components / Operating system package or component libvirt-daemon Operating systems & Components / Operating system package or component libvirt-admin Operating systems & Components / Operating system package or component libvirt-daemon-kvm Operating systems & Components / Operating system package or component libvirt-daemon-driver-storage-core Operating systems & Components / Operating system package or component libvirt-daemon-driver-secret Operating systems & Components / Operating system package or component libvirt-devel Operating systems & Components / Operating system package or component libvirt-daemon-driver-storage-disk Operating systems & Components / Operating system package or component libvirt-daemon-config-nwfilter Operating systems & Components / Operating system package or component libvirt-daemon-driver-storage-iscsi-direct Operating systems & Components / Operating system package or component libvirt-daemon-driver-storage-gluster Operating systems & Components / Operating system package or component libvirt-client Operating systems & Components / Operating system package or component libvirt-daemon-driver-storage-mpath Operating systems & Components / Operating system package or component libvirt-daemon-driver-interface Operating systems & Components / Operating system package or component libvirt-daemon-driver-storage-scsi Operating systems & Components / Operating system package or component libvirt-daemon-driver-storage Operating systems & Components / Operating system package or component libvirt-debugsource Operating systems & Components / Operating system package or component libvirt-daemon-qemu Operating systems & Components / Operating system package or component libvirt-lock-sanlock Operating systems & Components / Operating system package or component libvirt-daemon-driver-storage-rbd Operating systems & Components / Operating system package or component libvirt-libs Operating systems & Components / Operating system package or component libvirt-daemon-driver-network Operating systems & Components / Operating system package or component libvirt-daemon-driver-qemu Operating systems & Components / Operating system package or component libvirt Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU58358
Risk: Low
CVSSv4.0: 0.4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-3975
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a use-after-free error in the qemuMonitorUnregister() function in qemuProcessHandleMonitorEOF. An unprivileged client with a read-only connection can trigger the use-after-free error by calling the virConnectGetAllDomainStats API and crash the application.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP1 - 22.03 LTS
libvirt-daemon-driver-storage-iscsi: before 6.2.0-16
libvirt-wireshark: before 6.2.0-16
libvirt-nss: before 6.2.0-16
libvirt-daemon-driver-nodedev: before 6.2.0-16
libvirt-docs: before 6.2.0-16
libvirt-debuginfo: before 6.2.0-16
libvirt-daemon-driver-nwfilter: before 6.2.0-16
libvirt-bash-completion: before 6.2.0-16
libvirt-daemon-config-network: before 6.2.0-16
libvirt-daemon-driver-storage-logical: before 6.2.0-16
libvirt-daemon: before 6.2.0-16
libvirt-admin: before 6.2.0-16
libvirt-daemon-kvm: before 6.2.0-16
libvirt-daemon-driver-storage-core: before 6.2.0-16
libvirt-daemon-driver-secret: before 6.2.0-16
libvirt-devel: before 6.2.0-16
libvirt-daemon-driver-storage-disk: before 6.2.0-16
libvirt-daemon-config-nwfilter: before 6.2.0-16
libvirt-daemon-driver-storage-iscsi-direct: before 6.2.0-16
libvirt-daemon-driver-storage-gluster: before 6.2.0-16
libvirt-client: before 6.2.0-16
libvirt-daemon-driver-storage-mpath: before 6.2.0-16
libvirt-daemon-driver-interface: before 6.2.0-16
libvirt-daemon-driver-storage-scsi: before 6.2.0-16
libvirt-daemon-driver-storage: before 6.2.0-16
libvirt-debugsource: before 6.2.0-16
libvirt-daemon-qemu: before 6.2.0-16
libvirt-lock-sanlock: before 6.2.0-16
libvirt-daemon-driver-storage-rbd: before 6.2.0-16
libvirt-libs: before 6.2.0-16
libvirt-daemon-driver-network: before 6.2.0-16
libvirt-daemon-driver-qemu: before 6.2.0-16
libvirt: before 6.2.0-16
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-1891
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.