6.5
CVSSv3

CVE-2020-10703

Published: 02/06/2020 Updated: 01/04/2024
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 356
Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P

Vulnerability Summary

It exists that libvirt incorrectly handled an active pool without a target path. A remote attacker could possibly use this issue to cause libvirt to crash, resulting in a denial of service. (CVE-2020-10703)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

redhat libvirt

Vendor Advisories

Several security issues were fixed in libvirt ...
Synopsis Moderate: libvirt security and bug fix update Type/Severity Security Advisory: Moderate Topic An update for libvirt is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CVSS) ba ...
Synopsis Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update for the virt:rhel and virt-devel:rhel modules is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a securi ...
A flaw was found in the way the libvirtd daemon issued the 'suspend' command to a QEMU guest-agent running inside a guest, where it holds a monitor job while issuing the 'suspend' command to a guest-agent A malicious guest-agent may use this flaw to block the libvirt daemon indefinitely, resulting in a denial of service (CVE-2019-20485) A NULL po ...
A NULL pointer dereference was found in the libvirt API responsible introduced in upstream version 3100, and fixed in libvirt 600, for fetching a storage pool based on its target path In more detail, this flaw affects storage pools created without a target path such as network-based pools like gluster and RBD Unprivileged users with a read-on ...