libvirt vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the libvirt package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
Allocation of Resources Without Limits or Throttling

*
  • L
Uncontrolled Memory Allocation

<9.0.0-4+deb12u1
  • M
NULL Pointer Dereference

<9.0.0-4+deb12u1
  • L
CVE-2024-1441

<9.0.0-4+deb12u1
  • M
Improper Locking

<9.0.0-4+deb12u1
  • M
Memory Leak

<9.0.0-4
  • M
Improper Locking

<8.2.0-1
  • M
Improper Locking

<7.10.0-2
  • M
Use After Free

<7.6.0-1
  • M
Improper Locking

<7.6.0-1
  • M
Incorrect Permission Assignment for Critical Resource

<7.6.0-1
  • M
Double Free

<6.8.0-1
  • H
Missing Release of Resource after Effective Lifetime

<6.6.0-1
  • L
Memory Leak

<6.4.0-2
  • M
NULL Pointer Dereference

<6.0.0-2
  • M
Missing Authorization

<6.0.0-7
  • L
Improper Input Validation

<6.0.0-2
  • H
Improper Access Control

<5.0.0-4
  • H
Directory Traversal

<5.0.0-4
  • H
Directory Traversal

<5.0.0-4
  • H
Directory Traversal

<5.0.0-4
  • H
Access Restriction Bypass

<5.0.0-3
  • H
Security Features

<1.3.1-1
  • L
Information Exposure

<5.0.0-2
  • M
NULL Pointer Dereference

<5.0.0-1
  • L
Information Exposure

<2.2.0-1
  • M
NULL Pointer Dereference

<3.0.0-3
  • H
Resource Exhaustion

<4.1.0-1
  • H
Origin Validation Error

<4.0.0-2
  • H
Resource Exhaustion

<4.0.0-1
  • H
Improper Certificate Validation

<3.8.0-3
  • C
Improper Access Control

<2.0.0-1
  • L
Improper Access Control

<0.9.9-1
  • M
Improper Access Control

<1.2.20-1
  • L
Directory Traversal

<1.3.0-1
  • L
Information Exposure

<1.2.9-8
  • M
Access Restriction Bypass

<1.2.9-7
  • M
Access Restriction Bypass

<1.2.9-7
  • M
CVE-2014-8135

<1.2.9-7
  • M
CVE-2013-4399

<1.1.4-1
  • M
Credentials Management

<1.2.9-4
  • M
Resource Management Errors

<1.2.9-1
  • M
Out-of-Bounds

<1.2.8-2
  • L
Improper Input Validation

<1.2.4-1
  • L
Improper Input Validation

<1.2.4-1
  • L
CVE-2013-7336

<1.1.4-1
  • M
Link Following

<1.2.3-1
  • M
Access Restriction Bypass

<1.2.1-1
  • M
Access Restriction Bypass

<1.2.1-1
  • M
Race Condition

<1.2.1-1
  • H
Race Condition

<1.2.1-1
  • M
Access Restriction Bypass

<1.2.0-1
  • H
Access Restriction Bypass

<1.1.4-1
  • H
Access Restriction Bypass

<1.1.4-1
  • L
Access Restriction Bypass

<1.1.3~rc1-1
  • M
Out-of-Bounds

<1.1.2~rc1-1
  • M
Improper Input Validation

<1.1.0-3
  • M
Out-of-Bounds

<1.1.2-2
  • M
Resource Management Errors

<1.1.0-4
  • M
Resource Management Errors

<1.1.2~rc2-1
  • M
Out-of-Bounds

<1.1.4-1
  • M
Resource Management Errors

<1.1.0-1
  • M
Out-of-Bounds

<1.1.2~rc1-1
  • H
Access Restriction Bypass

<1.1.2-2
  • L
CVE-2013-4154

<1.1.0-4
  • M
Access Restriction Bypass

<0.9.12-8
  • M
Use After Free

<0.9.12-6
  • M
CVE-2012-4423

<0.9.12-5
  • L
Resource Management Errors

<0.9.12-4
  • M
Access Restriction Bypass

<0.9.12-1
  • M
Numeric Errors

<0.9.2-7
  • M
CVE-2011-2178

<0.9.1-2
  • L
Resource Management Errors

<0.9.0-1
  • L
Access Restriction Bypass

<0.8.8-3
  • M
Access Restriction Bypass

<0.8.3-1
  • L
Access Restriction Bypass

<0.8.3-1
  • M
Access Restriction Bypass

<0.8.3-1
  • L
Access Restriction Bypass

<0.8.3-1
  • L
Out-of-Bounds

<0.5.1-7
  • H
CVE-2008-5086

<0.4.6-10