libvirt-daemon-driver-storage-iscsi vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the libvirt-daemon-driver-storage-iscsi package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Improper Synchronization

<0:8.0.0-23.2.module+el8.10.0+21972+d7867348
  • M
Improper Certificate Validation

<0:8.0.0-23.2.module+el8.10.0+21972+d7867348
  • M
Double Free

<0:8.0.0-23.2.module+el8.10.0+21972+d7867348
  • H
Improper Input Validation

<0:8.0.0-23.2.module+el8.10.0+21972+d7867348
  • M
Stack-based Buffer Overflow

<0:8.0.0-23.module+el8.10.0+21023+5962ee04
  • M
NULL Pointer Dereference

<0:8.0.0-23.module+el8.10.0+21023+5962ee04
  • M
Incorrect Synchronization

<0:8.0.0-23.module+el8.10.0+21023+5962ee04
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:8.0.0-23.module+el8.10.0+21023+5962ee04
  • L
Race Condition

<0:8.0.0-23.2.module+el8.10.0+21972+d7867348
  • M
Uncontrolled Memory Allocation

<0:8.0.0-23.1.module+el8.10.0+21659+98b2ad6a
  • M
NULL Pointer Dereference

*
  • M
Off-by-one Error

*
  • M
Use After Free

<0:8.0.0-22.module+el8.9.0+19544+b3045133
  • M
Race Condition

<0:8.0.0-22.module+el8.9.0+19544+b3045133
  • M
Use After Free

<0:8.0.0-22.module+el8.9.0+19544+b3045133
  • H
Out-of-Bounds

<0:8.0.0-19.2.module+el8.8.0+18944+7f5acf75
  • H
NULL Pointer Dereference

<0:8.0.0-19.2.module+el8.8.0+18944+7f5acf75
  • M
Memory Leak

<0:8.0.0-19.2.module+el8.8.0+18944+7f5acf75
  • M
Out-of-bounds Read

<0:8.0.0-19.module+el8.8.0+18453+e0bf0d1d
  • M
Out-of-bounds Read

<0:8.0.0-10.1.module+el8.7.0+17192+cbc2449b
  • M
Integer Underflow

<0:8.0.0-19.module+el8.8.0+18453+e0bf0d1d
  • L
Out-of-Bounds

<0:8.0.0-10.module+el8.7.0+16689+53d59bc2
  • M
Heap-based Buffer Overflow

<0:8.0.0-19.module+el8.8.0+18453+e0bf0d1d
  • M
Heap-based Buffer Overflow

<0:8.0.0-19.module+el8.8.0+18453+e0bf0d1d
  • M
Heap-based Buffer Overflow

<0:8.0.0-19.module+el8.8.0+18453+e0bf0d1d
  • M
Buffer Overflow

<0:8.0.0-19.module+el8.8.0+18453+e0bf0d1d
  • M
Heap-based Buffer Overflow

<0:8.0.0-19.module+el8.8.0+18453+e0bf0d1d
  • M
Integer Overflow or Wraparound

<0:8.0.0-5.2.module+el8.6.0+15256+3a0914fe
  • M
Race Condition

<0:8.0.0-5.2.module+el8.6.0+15256+3a0914fe
  • L
Improper Locking

<0:8.0.0-10.module+el8.7.0+16689+53d59bc2
  • M
Missing Release of Resource after Effective Lifetime

<0:8.0.0-5.2.module+el8.6.0+15256+3a0914fe
  • M
Missing Release of Resource after Effective Lifetime

<0:8.0.0-5.2.module+el8.6.0+15256+3a0914fe
  • L
Out-of-bounds Read

<0:8.0.0-10.module+el8.7.0+16689+53d59bc2
  • M
Unchecked Return Value

<0:8.0.0-5.module+el8.6.0+14480+c0a3aa0f
  • M
Improper Check for Dropped Privileges

<0:6.0.0-37.1.module+el8.5.0+13858+39fdc467
  • M
NULL Pointer Dereference

<0:8.0.0-5.module+el8.6.0+14480+c0a3aa0f
  • M
NULL Pointer Dereference

<0:8.0.0-5.module+el8.6.0+14480+c0a3aa0f
  • M
Use After Free

<0:8.0.0-5.module+el8.6.0+14480+c0a3aa0f
  • L
Off-by-one Error

<0:6.0.0-37.module+el8.5.0+12162+40884dd2
  • M
Out-of-Bounds

<0:8.0.0-5.module+el8.6.0+14480+c0a3aa0f
  • M
Out-of-Bounds

<0:8.0.0-5.module+el8.6.0+14480+c0a3aa0f
  • M
Out-of-Bounds

<0:8.0.0-5.module+el8.6.0+14480+c0a3aa0f
  • M
Out-of-Bounds

<0:8.0.0-5.module+el8.6.0+14480+c0a3aa0f
  • M
Out-of-Bounds

<0:8.0.0-5.module+el8.6.0+14480+c0a3aa0f
  • M
Out-of-Bounds

<0:8.0.0-5.module+el8.6.0+14480+c0a3aa0f
  • M
Out-of-Bounds

<0:8.0.0-5.module+el8.6.0+14480+c0a3aa0f
  • M
Out-of-Bounds

<0:8.0.0-5.module+el8.6.0+14480+c0a3aa0f
  • M
Out-of-Bounds

<0:8.0.0-5.module+el8.6.0+14480+c0a3aa0f
  • M
Out-of-Bounds

<0:8.0.0-5.module+el8.6.0+14480+c0a3aa0f
  • M
Out-of-Bounds

<0:8.0.0-5.module+el8.6.0+14480+c0a3aa0f
  • M
Out-of-Bounds

<0:8.0.0-5.module+el8.6.0+14480+c0a3aa0f
  • M
Out-of-Bounds

<0:8.0.0-5.module+el8.6.0+14480+c0a3aa0f
  • M
Out-of-Bounds

<0:8.0.0-5.module+el8.6.0+14480+c0a3aa0f
  • M
Out-of-Bounds

<0:8.0.0-5.module+el8.6.0+14480+c0a3aa0f
  • M
Out-of-Bounds

<0:8.0.0-5.module+el8.6.0+14480+c0a3aa0f
  • M
Out-of-Bounds

<0:8.0.0-5.module+el8.6.0+14480+c0a3aa0f
  • M
Out-of-Bounds

<0:8.0.0-5.module+el8.6.0+14480+c0a3aa0f
  • M
Out-of-Bounds

<0:8.0.0-5.module+el8.6.0+14480+c0a3aa0f
  • M
Out-of-Bounds

<0:8.0.0-5.module+el8.6.0+14480+c0a3aa0f
  • M
Out-of-Bounds

<0:8.0.0-5.module+el8.6.0+14480+c0a3aa0f
  • M
Use After Free

<0:8.0.0-5.module+el8.6.0+14480+c0a3aa0f
  • M
Improper Enforcement of Message Integrity During Transmission in a Communication Channel

<0:8.0.0-5.module+el8.6.0+14480+c0a3aa0f
  • M
Resource Exhaustion

<0:8.0.0-5.module+el8.6.0+14480+c0a3aa0f
  • M
Improper Locking

<0:6.0.0-37.module+el8.5.0+12162+40884dd2
  • M
Double Free

<0:6.0.0-35.module+el8.4.0+10230+7a9b21e4
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:6.0.0-35.module+el8.4.0+10230+7a9b21e4
  • M
Out-of-bounds Read

<0:6.0.0-28.1.module+el8.3.0+10448+0c705bc6
  • H
Improper Privilege Management

<0:6.0.0-28.module+el8.3.0+7827+5e65edd7
  • M
Missing Release of Resource after Effective Lifetime

<0:6.0.0-28.module+el8.3.0+7827+5e65edd7
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:6.0.0-28.module+el8.3.0+7827+5e65edd7
  • M
NULL Pointer Dereference

<0:6.0.0-28.module+el8.3.0+7827+5e65edd7
  • H
Out-of-bounds Read

<0:4.5.0-42.module+el8.2.0+6024+15a2423f
  • H
Memory Leak

<0:4.5.0-42.module+el8.2.0+6024+15a2423f
  • H
Heap-based Buffer Overflow

<0:4.5.0-42.module+el8.2.0+6024+15a2423f
  • H
Heap-based Buffer Overflow

<0:4.5.0-35.3.module+el8.1.0+5931+8897e7e1
  • H
Heap-based Buffer Overflow

<0:4.5.0-35.3.module+el8.1.0+5931+8897e7e1
  • M
Use After Free

<0:6.0.0-28.module+el8.3.0+7827+5e65edd7
  • M
Out-of-bounds Read

<0:6.0.0-35.module+el8.4.0+10230+7a9b21e4
  • M
Sensitive Information Uncleared Before Release

<0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730
  • M
Use After Free

<0:6.0.0-28.module+el8.3.0+7827+5e65edd7
  • M
Reachable Assertion

<0:6.0.0-35.module+el8.4.0+10230+7a9b21e4
  • M
Out-of-bounds Write

<0:6.0.0-35.module+el8.4.0+10230+7a9b21e4
  • M
Out-of-bounds Read

<0:6.0.0-35.module+el8.4.0+10230+7a9b21e4
  • M
Out-of-bounds Read

<0:6.0.0-35.module+el8.4.0+10230+7a9b21e4
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:6.0.0-35.module+el8.4.0+10230+7a9b21e4
  • M
Reachable Assertion

<0:6.0.0-35.module+el8.4.0+10230+7a9b21e4
  • M
Resource Exhaustion

<0:6.0.0-28.module+el8.3.0+7827+5e65edd7
  • H
Out-of-bounds Read

<0:4.5.0-42.module+el8.2.0+6024+15a2423f
  • M
Incorrect Calculation of Buffer Size

<0:6.0.0-35.module+el8.4.0+10230+7a9b21e4
  • H
Heap-based Buffer Overflow

<0:4.5.0-24.3.module+el8.0.0+4084+cceb9f44
  • L
Heap-based Buffer Overflow

<0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • L
Information Exposure

<0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • L
NULL Pointer Dereference

<0:4.5.0-35.module+el8.1.0+4227+b2722cb3
  • H
Improper Access Control

<0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • H
Improper Access Control

<0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • H
Improper Access Control

<0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • H
Improper Access Control

<0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.5.0-23.2.module+el8.0.0+3213+f56c86d8
  • H
Heap-based Buffer Overflow

<0:4.5.0-23.1.module+el8.0.0+3151+3ba813f9
  • H
Integer Overflow or Wraparound

<0:4.5.0-23.1.module+el8.0.0+3151+3ba813f9
  • H
Integer Overflow or Wraparound

<0:4.5.0-23.1.module+el8.0.0+3151+3ba813f9
  • H
Integer Overflow or Wraparound

<0:4.5.0-23.1.module+el8.0.0+3151+3ba813f9
  • H
Integer Overflow or Wraparound

<0:4.5.0-23.1.module+el8.0.0+3151+3ba813f9
  • H
Sensitive Information Uncleared Before Release

<0:4.5.0-23.1.module+el8.0.0+3151+3ba813f9
  • H
Information Exposure

<0:4.5.0-23.1.module+el8.0.0+3151+3ba813f9
  • H
Sensitive Information Uncleared Before Release

<0:4.5.0-23.1.module+el8.0.0+3151+3ba813f9
  • H
Sensitive Information Uncleared Before Release

<0:4.5.0-23.1.module+el8.0.0+3151+3ba813f9
  • M
Incorrect Permission Assignment for Critical Resource

<0:6.0.0-37.module+el8.5.0+12162+40884dd2
  • L
Out-of-Bounds

<0:8.0.0-10.module+el8.7.0+16689+53d59bc2
  • M
Access of Uninitialized Pointer

<0:6.0.0-37.module+el8.5.0+12162+40884dd2
  • M
Access of Uninitialized Pointer

<0:6.0.0-37.module+el8.5.0+12162+40884dd2
  • M
Access of Uninitialized Pointer

<0:6.0.0-37.module+el8.5.0+12162+40884dd2
  • M
Access of Uninitialized Pointer

<0:6.0.0-37.module+el8.5.0+12162+40884dd2
  • M
Out-of-bounds Read

<0:6.0.0-35.1.module+el8.4.0+11273+64eb94ef
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:6.0.0-35.1.module+el8.4.0+11273+64eb94ef
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:6.0.0-37.module+el8.5.0+12162+40884dd2
  • M
Out-of-bounds Read

<0:6.0.0-35.1.module+el8.4.0+11273+64eb94ef
  • M
NULL Pointer Dereference

<0:8.0.0-5.module+el8.6.0+14480+c0a3aa0f
  • M
Reachable Assertion

<0:6.0.0-35.1.module+el8.4.0+11273+64eb94ef
  • M
Use After Free

<0:6.0.0-37.module+el8.5.0+12162+40884dd2
  • M
Out-of-bounds Read

<0:6.0.0-35.1.module+el8.4.0+11273+64eb94ef