libvirt vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the libvirt package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Allocation of Resources Without Limits or Throttling

*
  • L
Uncontrolled Memory Allocation

<10.2.0-1
  • M
Improper Locking

<9.6.0-1
  • M
Missing Authorization

<6.0.0-7
  • H
Origin Validation Error

<4.0.0-2
  • M
Improper Locking

<7.10.0-2
  • L
Information Exposure

<2.2.0-1
  • M
Improper Access Control

<1.2.20-1
  • L
Improper Input Validation

<1.2.4-1
  • M
NULL Pointer Dereference

<10.7.0-1
  • M
NULL Pointer Dereference

<9.8.0-1
  • L
CVE-2024-1441

<10.1.0-1
  • M
Resource Management Errors

<1.1.0-4
  • M
Access Restriction Bypass

<0.9.12-1
  • L
Access Restriction Bypass

<0.8.3-1
  • H
Improper Access Control

<5.0.0-4
  • M
CVE-2014-8135

<1.2.9-7
  • M
Credentials Management

<1.2.9-4
  • M
Race Condition

<1.2.1-1
  • L
Information Exposure

<1.2.9-8
  • L
Use After Free

<10.3.0-1
  • M
Out-of-Bounds

<1.1.4-1
  • M
Use After Free

<7.6.0-1
  • H
Missing Release of Resource after Effective Lifetime

<6.6.0-1
  • M
Incorrect Permission Assignment for Critical Resource

<7.6.0-1
  • M
Out-of-Bounds

<1.1.2~rc1-1
  • M
Access Restriction Bypass

<0.9.12-8
  • M
Link Following

<1.2.3-1
  • M
NULL Pointer Dereference

<5.0.0-1
  • H
Access Restriction Bypass

<1.1.4-1
  • M
Resource Management Errors

<1.1.2~rc2-1
  • M
Access Restriction Bypass

<0.8.3-1
  • H
Resource Exhaustion

<4.1.0-1
  • L
Out-of-Bounds

<0.5.1-7
  • L
Access Restriction Bypass

<0.8.3-1
  • M
Resource Management Errors

<1.2.9-1
  • H
Directory Traversal

<5.0.0-4
  • L
CVE-2013-7336

<1.1.4-1
  • L
Improper Input Validation

<1.2.4-1
  • L
Improper Access Control

<0.9.9-1
  • M
Out-of-Bounds

<1.1.2~rc1-1
  • M
Double Free

<6.8.0-1
  • L
Access Restriction Bypass

<0.8.8-3
  • H
Resource Exhaustion

<4.0.0-1
  • L
Directory Traversal

<1.3.0-1
  • H
Access Restriction Bypass

<5.0.0-3
  • M
Access Restriction Bypass

<1.2.1-1
  • M
Improper Input Validation

<1.1.0-3
  • M
CVE-2012-4423

<0.9.12-5
  • M
Use After Free

<0.9.12-6
  • M
Access Restriction Bypass

<0.8.3-1
  • M
Improper Locking

<8.2.0-1
  • L
Memory Leak

<6.4.0-2
  • M
Memory Leak

<9.0.0-4
  • M
Improper Locking

<7.6.0-1
  • H
Directory Traversal

<5.0.0-4
  • H
Security Features

<1.3.1-1
  • M
Out-of-Bounds

<1.2.8-2
  • L
Information Exposure

<5.0.0-2
  • M
Access Restriction Bypass

<1.2.9-7
  • H
Improper Certificate Validation

<3.8.0-3
  • H
Race Condition

<1.2.1-1
  • M
Access Restriction Bypass

<1.2.9-7
  • M
CVE-2013-4399

<1.1.4-1
  • H
Access Restriction Bypass

<1.1.4-1
  • L
Resource Management Errors

<0.9.12-4
  • M
CVE-2011-2178

<0.9.1-2
  • H
Access Restriction Bypass

<1.1.2-2
  • L
CVE-2013-4154

<1.1.0-4
  • H
CVE-2008-5086

<0.4.6-10
  • M
NULL Pointer Dereference

<6.0.0-2
  • L
Improper Input Validation

<6.0.0-2
  • M
NULL Pointer Dereference

<3.0.0-3
  • C
Improper Access Control

<2.0.0-1
  • H
Directory Traversal

<5.0.0-4
  • M
Access Restriction Bypass

<1.2.1-1
  • M
Access Restriction Bypass

<1.2.0-1
  • M
Out-of-Bounds

<1.1.2-2
  • L
Access Restriction Bypass

<1.1.3~rc1-1
  • L
Resource Management Errors

<0.9.0-1
  • M
Numeric Errors

<0.9.2-7
  • M
Resource Management Errors

<1.1.0-1