libvirt vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the libvirt package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Improper Locking

*
  • L
Improper Locking

*
  • L
Use After Free

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • M
Double Free

<3.0.0-4+deb9u5
  • L
Improper Input Validation

*
  • H
Directory Traversal

<3.0.0-4+deb9u4
  • H
Directory Traversal

<3.0.0-4+deb9u4
  • H
Security Features

<1.3.1-1
  • L
NULL Pointer Dereference

*
  • L
Information Exposure

<2.2.0-1
  • M
NULL Pointer Dereference

<3.0.0-3
  • H
Resource Exhaustion

<3.0.0-4+deb9u3
  • H
Origin Validation Error

<3.0.0-4+deb9u3
  • H
Resource Exhaustion

<3.0.0-4+deb9u2
  • H
Improper Certificate Validation

<3.0.0-4+deb9u1
  • C
Improper Access Control

<2.0.0-1
  • M
Improper Access Control

<1.2.20-1
  • L
Improper Access Control

<0.9.9-1
  • L
Directory Traversal

<1.3.0-1
  • L
Information Exposure

<1.2.9-8
  • M
Access Restriction Bypass

<1.2.9-7
  • M
CVE-2014-8135

<1.2.9-7
  • M
Access Restriction Bypass

<1.2.9-7
  • M
CVE-2013-4399

<1.1.4-1
  • M
Credentials Management

<1.2.9-4
  • M
Resource Management Errors

<1.2.9-1
  • M
Out-of-Bounds

<1.2.8-2
  • L
Improper Input Validation

<1.2.4-1
  • L
Improper Input Validation

<1.2.4-1
  • L
CVE-2013-7336

<1.1.4-1
  • M
Link Following

<1.2.3-1
  • M
Access Restriction Bypass

<1.2.1-1
  • M
Access Restriction Bypass

<1.2.1-1
  • H
Race Condition

<1.2.1-1
  • M
Race Condition

<1.2.1-1
  • M
Access Restriction Bypass

<1.2.0-1
  • H
Access Restriction Bypass

<1.1.4-1
  • H
Access Restriction Bypass

<1.1.4-1
  • L
Access Restriction Bypass

<1.1.3~rc1-1
  • M
Resource Management Errors

<1.1.0-1
  • M
Resource Management Errors

<1.1.0-4
  • M
Improper Input Validation

<1.1.0-3
  • L
CVE-2013-4154

<1.1.0-4
  • M
Out-of-Bounds

<1.1.4-1
  • M
Out-of-Bounds

<1.1.2-2
  • M
Out-of-Bounds

<1.1.2~rc1-1
  • M
Out-of-Bounds

<1.1.2~rc1-1
  • M
Resource Management Errors

<1.1.2~rc2-1
  • H
Access Restriction Bypass

<1.1.2-2
  • M
Access Restriction Bypass

<0.9.12-8
  • M
Use After Free

<0.9.12-6
  • M
CVE-2012-4423

<0.9.12-5
  • L
Resource Management Errors

<0.9.12-4
  • M
Access Restriction Bypass

<0.9.12-1
  • M
Numeric Errors

<0.9.2-7
  • M
CVE-2011-2178

<0.9.1-2
  • L
Resource Management Errors

<0.9.0-1
  • L
Access Restriction Bypass

<0.8.8-3
  • L
Access Restriction Bypass

<0.8.3-1
  • L
Access Restriction Bypass

<0.8.3-1
  • M
Access Restriction Bypass

<0.8.3-1
  • M
Access Restriction Bypass

<0.8.3-1
  • L
Out-of-Bounds

<0.5.1-7
  • H
CVE-2008-5086

<0.4.6-10