libvirt vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the libvirt package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Uncontrolled Memory Allocation

<9.0.0-4+deb12u1
  • L
NULL Pointer Dereference

<9.0.0-4+deb12u1
  • L
CVE-2024-1441

<9.0.0-4+deb12u1
  • M
Improper Locking

<9.0.0-4+deb12u1
  • M
Memory Leak

<9.0.0-4
  • M
Improper Locking

<8.2.0-1
  • M
Improper Locking

<7.10.0-2
  • M
Use After Free

<7.6.0-1
  • M
Improper Locking

<7.6.0-1
  • M
Incorrect Permission Assignment for Critical Resource

<7.6.0-1
  • M
Double Free

<6.8.0-1
  • H
Missing Release of Resource after Effective Lifetime

<6.6.0-1
  • L
Memory Leak

<6.4.0-2
  • M
NULL Pointer Dereference

<6.0.0-2
  • M
Missing Authorization

<6.0.0-7
  • L
Improper Input Validation

<6.0.0-2
  • H
Improper Access Control

<5.0.0-4
  • H
Directory Traversal

<5.0.0-4
  • H
Directory Traversal

<5.0.0-4
  • H
Directory Traversal

<5.0.0-4
  • H
Access Restriction Bypass

<5.0.0-3
  • H
Security Features

<1.3.1-1
  • L
Information Exposure

<5.0.0-2
  • M
NULL Pointer Dereference

<5.0.0-1
  • L
Information Exposure

<2.2.0-1
  • M
NULL Pointer Dereference

<3.0.0-3
  • H
Resource Exhaustion

<4.1.0-1
  • H
Origin Validation Error

<4.0.0-2
  • H
Resource Exhaustion

<4.0.0-1
  • H
Improper Certificate Validation

<3.8.0-3
  • C
Improper Access Control

<2.0.0-1
  • L
Improper Access Control

<0.9.9-1
  • M
Improper Access Control

<1.2.20-1
  • L
Directory Traversal

<1.3.0-1
  • L
Information Exposure

<1.2.9-8
  • M
Access Restriction Bypass

<1.2.9-7
  • M
Access Restriction Bypass

<1.2.9-7
  • M
CVE-2014-8135

<1.2.9-7
  • M
CVE-2013-4399

<1.1.4-1
  • M
Credentials Management

<1.2.9-4
  • M
Resource Management Errors

<1.2.9-1
  • M
Out-of-Bounds

<1.2.8-2
  • L
Improper Input Validation

<1.2.4-1
  • L
Improper Input Validation

<1.2.4-1
  • L
CVE-2013-7336

<1.1.4-1
  • M
Link Following

<1.2.3-1
  • H
Race Condition

<1.2.1-1
  • M
Race Condition

<1.2.1-1
  • M
Access Restriction Bypass

<1.2.1-1
  • M
Access Restriction Bypass

<1.2.1-1
  • M
Access Restriction Bypass

<1.2.0-1
  • H
Access Restriction Bypass

<1.1.4-1
  • H
Access Restriction Bypass

<1.1.4-1
  • L
Access Restriction Bypass

<1.1.3~rc1-1
  • M
Out-of-Bounds

<1.1.4-1
  • H
Access Restriction Bypass

<1.1.2-2
  • M
Resource Management Errors

<1.1.2~rc2-1
  • M
Improper Input Validation

<1.1.0-3
  • M
Resource Management Errors

<1.1.0-1
  • M
Out-of-Bounds

<1.1.2~rc1-1
  • M
Out-of-Bounds

<1.1.2-2
  • M
Resource Management Errors

<1.1.0-4
  • M
Out-of-Bounds

<1.1.2~rc1-1
  • L
CVE-2013-4154

<1.1.0-4
  • M
Access Restriction Bypass

<0.9.12-8
  • M
Use After Free

<0.9.12-6
  • M
CVE-2012-4423

<0.9.12-5
  • L
Resource Management Errors

<0.9.12-4
  • M
Access Restriction Bypass

<0.9.12-1
  • M
Numeric Errors

<0.9.2-7
  • M
CVE-2011-2178

<0.9.1-2
  • L
Resource Management Errors

<0.9.0-1
  • L
Access Restriction Bypass

<0.8.8-3
  • L
Access Restriction Bypass

<0.8.3-1
  • M
Access Restriction Bypass

<0.8.3-1
  • M
Access Restriction Bypass

<0.8.3-1
  • L
Access Restriction Bypass

<0.8.3-1
  • L
Out-of-Bounds

<0.5.1-7
  • H
CVE-2008-5086

<0.4.6-10