libvirt vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the libvirt package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
NULL Pointer Dereference

<10.7.0-1
  • L
Use After Free

<10.3.0-1
  • L
Uncontrolled Memory Allocation

<10.2.0-1
  • L
NULL Pointer Dereference

<9.8.0-1
  • L
CVE-2024-1441

<10.1.0-1
  • M
Improper Locking

<9.6.0-1
  • M
Memory Leak

<9.0.0-4
  • M
Improper Locking

<8.2.0-1
  • M
Improper Locking

<7.10.0-2
  • M
Use After Free

<7.6.0-1
  • M
Improper Locking

<7.6.0-1
  • M
Incorrect Permission Assignment for Critical Resource

<7.6.0-1
  • M
Double Free

<6.8.0-1
  • H
Missing Release of Resource after Effective Lifetime

<6.6.0-1
  • L
Memory Leak

<6.4.0-2
  • M
NULL Pointer Dereference

<6.0.0-2
  • M
Missing Authorization

<6.0.0-7
  • L
Improper Input Validation

<6.0.0-2
  • H
Improper Access Control

<5.0.0-4
  • H
Directory Traversal

<5.0.0-4
  • H
Directory Traversal

<5.0.0-4
  • H
Directory Traversal

<5.0.0-4
  • H
Access Restriction Bypass

<5.0.0-3
  • H
Security Features

<1.3.1-1
  • L
Information Exposure

<5.0.0-2
  • M
NULL Pointer Dereference

<5.0.0-1
  • L
Information Exposure

<2.2.0-1
  • M
NULL Pointer Dereference

<3.0.0-3
  • H
Resource Exhaustion

<4.1.0-1
  • H
Origin Validation Error

<4.0.0-2
  • H
Resource Exhaustion

<4.0.0-1
  • H
Improper Certificate Validation

<3.8.0-3
  • C
Improper Access Control

<2.0.0-1
  • L
Improper Access Control

<0.9.9-1
  • M
Improper Access Control

<1.2.20-1
  • L
Directory Traversal

<1.3.0-1
  • L
Information Exposure

<1.2.9-8
  • M
Access Restriction Bypass

<1.2.9-7
  • M
Access Restriction Bypass

<1.2.9-7
  • M
CVE-2014-8135

<1.2.9-7
  • M
CVE-2013-4399

<1.1.4-1
  • M
Credentials Management

<1.2.9-4
  • M
Resource Management Errors

<1.2.9-1
  • M
Out-of-Bounds

<1.2.8-2
  • L
Improper Input Validation

<1.2.4-1
  • L
Improper Input Validation

<1.2.4-1
  • L
CVE-2013-7336

<1.1.4-1
  • M
Link Following

<1.2.3-1
  • M
Access Restriction Bypass

<1.2.1-1
  • M
Race Condition

<1.2.1-1
  • M
Access Restriction Bypass

<1.2.1-1
  • H
Race Condition

<1.2.1-1
  • M
Access Restriction Bypass

<1.2.0-1
  • H
Access Restriction Bypass

<1.1.4-1
  • H
Access Restriction Bypass

<1.1.4-1
  • L
Access Restriction Bypass

<1.1.3~rc1-1
  • M
Resource Management Errors

<1.1.2~rc2-1
  • H
Access Restriction Bypass

<1.1.2-2
  • M
Out-of-Bounds

<1.1.2~rc1-1
  • M
Improper Input Validation

<1.1.0-3
  • M
Resource Management Errors

<1.1.0-4
  • M
Out-of-Bounds

<1.1.2-2
  • M
Resource Management Errors

<1.1.0-1
  • L
CVE-2013-4154

<1.1.0-4
  • M
Out-of-Bounds

<1.1.2~rc1-1
  • M
Out-of-Bounds

<1.1.4-1
  • M
Access Restriction Bypass

<0.9.12-8
  • M
Use After Free

<0.9.12-6
  • M
CVE-2012-4423

<0.9.12-5
  • L
Resource Management Errors

<0.9.12-4
  • M
Access Restriction Bypass

<0.9.12-1
  • M
CVE-2011-2178

<0.9.1-2
  • M
Numeric Errors

<0.9.2-7
  • L
Resource Management Errors

<0.9.0-1
  • L
Access Restriction Bypass

<0.8.8-3
  • L
Access Restriction Bypass

<0.8.3-1
  • L
Access Restriction Bypass

<0.8.3-1
  • M
Access Restriction Bypass

<0.8.3-1
  • M
Access Restriction Bypass

<0.8.3-1
  • L
Out-of-Bounds

<0.5.1-7
  • H
CVE-2008-5086

<0.4.6-10