libvirt-admin vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the libvirt-admin package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
CVE-2024-3447

<0:5.7.0-44.module+el8.10.0+90415+56803fd5
  • M
CVE-2024-1441

<0:5.7.0-42.module+el8.9.0+90333+3bd482f4
  • M
Memory Leak

<0:5.7.0-42.module+el8.9.0+90333+3bd482f4
  • M
Out-of-bounds Write

<0:5.7.0-41.module+el8.8.0+21148+e83324c8
  • M
Out-of-bounds Write

<0:5.7.0-41.module+el8.8.0+21148+e83324c8
  • M
Race Condition

<0:5.7.0-41.module+el8.8.0+21148+e83324c8
  • H
Improper Privilege Management

<0:5.7.0-40.module+el8.7.0+21037+8ee66348
  • H
Use After Free

<0:5.7.0-38.module+el8.7.0+20894+2d7709ab
  • H
Integer Underflow

<0:5.7.0-38.module+el8.7.0+20894+2d7709ab
  • H
Out-of-bounds Write

<0:5.7.0-38.module+el8.7.0+20894+2d7709ab
  • H
Buffer Overflow

<0:5.7.0-38.module+el8.7.0+20894+2d7709ab
  • H
Out-of-bounds Read

<0:5.7.0-40.module+el8.7.0+21037+8ee66348
  • H
Use After Free

<0:5.7.0-37.module+el8.6.0+20847+e0e2c16f
  • H
Buffer Overflow

<0:5.7.0-34.module+el8.6.0+20690+93de6acb
  • H
Buffer Overflow

<0:5.7.0-34.module+el8.6.0+20690+93de6acb
  • H
Out-of-Bounds

<0:5.7.0-34.module+el8.6.0+20690+93de6acb
  • H
Missing Release of Resource after Effective Lifetime

<0:5.7.0-33.module+el8.5.0+20645+1693a26d
  • H
Improper Locking

<0:5.7.0-33.module+el8.5.0+20645+1693a26d
  • H
Missing Release of Resource after Effective Lifetime

<0:5.7.0-33.module+el8.5.0+20645+1693a26d
  • H
Use After Free

<0:5.7.0-33.module+el8.5.0+20645+1693a26d
  • H
Use After Free

<0:5.7.0-34.module+el8.6.0+20690+93de6acb
  • H
NULL Pointer Dereference

<0:5.7.0-32.module+el8.5.0+20514+67db989a
  • H
NULL Pointer Dereference

<0:5.7.0-32.module+el8.5.0+20482+a450964e
  • H
NULL Pointer Dereference

<0:5.7.0-32.module+el8.5.0+20482+a450964e
  • H
Integer Overflow or Wraparound

<0:5.7.0-32.module+el8.5.0+20482+a450964e
  • H
Out-of-bounds Read

<0:5.7.0-32.module+el8.5.0+20482+a450964e
  • M
Improper Check for Dropped Privileges

<0:6.0.0-37.1.0.1.module+el8.5.0+20490+52363fdb
  • H
Out-of-bounds Write

<0:5.7.0-32.module+el8.5.0+20482+a450964e
  • H
Release of Invalid Pointer or Reference

<0:5.7.0-32.module+el8.5.0+20482+a450964e
  • H
Out-of-Bounds

<0:5.7.0-31.module+el8.4.0+20319+6eb4347c
  • H
Use of Uninitialized Resource

<0:5.7.0-31.module+el8.4.0+20319+6eb4347c
  • H
Allocation of Resources Without Limits or Throttling

<0:5.7.0-31.module+el8.4.0+20319+6eb4347c
  • H
Access of Uninitialized Pointer

<0:5.7.0-31.module+el8.4.0+20319+6eb4347c
  • H
Integer Overflow or Wraparound

<0:5.7.0-31.module+el8.4.0+20319+6eb4347c
  • H
Memory Leak

<0:5.7.0-31.module+el8.4.0+20319+6eb4347c
  • H
Use After Free

<0:5.7.0-31.module+el8.4.0+20319+6eb4347c
  • H
Out-of-bounds Write

<0:5.7.0-31.module+el8.4.0+20319+6eb4347c
  • H
Divide By Zero

<0:5.7.0-31.module+el8.4.0+20319+6eb4347c
  • H
Out-of-Bounds

<0:5.7.0-31.module+el8.4.0+20319+6eb4347c
  • H
NULL Pointer Dereference

<0:5.7.0-31.module+el8.4.0+20319+6eb4347c
  • H
Off-by-one Error

<0:5.7.0-32.module+el8.5.0+20482+a450964e
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:5.7.0-32.module+el8.5.0+20482+a450964e
  • H
Access of Uninitialized Pointer

<0:5.7.0-32.module+el8.5.0+20482+a450964e
  • M
Incorrect Permission Assignment for Critical Resource

<0:6.0.0-37.0.1.module+el8.5.0+20365+3abb8f5b
  • H
Access of Uninitialized Pointer

<0:5.7.0-32.module+el8.5.0+20482+a450964e
  • M
Improper Locking

<0:6.0.0-37.0.1.module+el8.5.0+20365+3abb8f5b
  • H
Access of Uninitialized Pointer

<0:5.7.0-32.module+el8.5.0+20482+a450964e
  • M
Use After Free

<0:6.0.0-37.0.1.module+el8.5.0+20365+3abb8f5b
  • H
Access of Uninitialized Pointer

<0:5.7.0-32.module+el8.5.0+20482+a450964e
  • H
Out-of-bounds Read

<0:5.7.0-31.module+el8.4.0+20319+6eb4347c
  • M
Reachable Assertion

<0:6.0.0-35.1.0.1.module+el8.4.0+20285+126f2e4b
  • M
Out-of-Bounds

<0:6.0.0-35.1.0.1.module+el8.4.0+20285+126f2e4b
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:5.7.0-32.module+el8.5.0+20482+a450964e
  • M
Out-of-bounds Read

<0:6.0.0-35.1.0.1.module+el8.4.0+20285+126f2e4b
  • M
CVE-2020-25707

<0:6.0.0-35.0.1.module+el8.4.0+20171+f6690737
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:6.0.0-35.0.1.module+el8.4.0+20171+f6690737
  • H
Out-of-bounds Write

<0:5.7.0-31.module+el8.4.0+20319+6eb4347c
  • H
Out-of-bounds Read

<0:5.7.0-32.module+el8.5.0+20482+a450964e
  • M
Reachable Assertion

<0:6.0.0-35.0.1.module+el8.4.0+20171+f6690737
  • M
Out-of-bounds Read

<0:6.0.0-35.0.1.module+el8.4.0+20171+f6690737
  • M
Out-of-bounds Read

<0:6.0.0-35.0.1.module+el8.4.0+20171+f6690737
  • H
Out-of-bounds Read

<0:5.7.0-32.module+el8.5.0+20482+a450964e
  • M
Out-of-bounds Read

<0:6.0.0-28.1.0.1.module+el8.3.0+20008+729ca284
  • H
Improper Privilege Management

<0:6.0.0-28.0.1.module+el8.3.0+7860+a7792d29
  • M
Reachable Assertion

<0:6.0.0-35.0.1.module+el8.4.0+20171+f6690737
  • M
Double Free

<0:6.0.0-35.0.1.module+el8.4.0+20171+f6690737
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:6.0.0-28.0.1.module+el8.3.0+7860+a7792d29
  • M
Missing Release of Resource after Effective Lifetime

<0:6.0.0-28.0.1.module+el8.3.0+7860+a7792d29
  • H
Out-of-bounds Read

<0:4.5.0-42.0.1.module+el8.2.0+5598+5fbb295f
  • H
Out-of-bounds Read

<0:4.5.0-42.0.1.module+el8.2.0+5598+5fbb295f
  • M
NULL Pointer Dereference

<0:6.0.0-28.0.1.module+el8.3.0+7860+a7792d29
  • M
Improper Input Validation

<0:6.0.0-28.0.1.module+el8.3.0+7860+a7792d29
  • M
Use After Free

<0:6.0.0-28.0.1.module+el8.3.0+7860+a7792d29
  • H
Memory Leak

<0:4.5.0-42.0.1.module+el8.2.0+5598+5fbb295f
  • H
Buffer Overflow

<0:4.5.0-42.0.1.module+el8.2.0+5598+5fbb295f
  • H
Out-of-bounds Write

<0:4.5.0-35.3.0.1.module+el8.1.0+5574+a95766b2
  • M
Use After Free

<0:6.0.0-28.0.1.module+el8.3.0+7860+a7792d29
  • H
Out-of-bounds Write

<0:4.5.0-35.3.0.1.module+el8.1.0+5574+a95766b2
  • M
CVE-2019-11135

<0:4.5.0-35.2.0.1.module+el8.1.0+5470+cad7d629
  • L
Integer Underflow

<0:4.5.0-35.0.1.module+el8.1.0+5378+c5e0f4d7
  • L
NULL Pointer Dereference

<0:4.5.0-35.0.1.module+el8.1.0+5378+c5e0f4d7
  • L
Use of Uninitialized Resource

<0:4.5.0-35.0.1.module+el8.1.0+5378+c5e0f4d7
  • H
CVE-2019-10166

<0:4.5.0-23.3.0.1.module+el8.0.0.z+5234+5e9073e3
  • H
Directory Traversal

<0:4.5.0-23.3.0.1.module+el8.0.0.z+5234+5e9073e3
  • H
Directory Traversal

<0:4.5.0-23.3.0.1.module+el8.0.0.z+5234+5e9073e3
  • H
Directory Traversal

<0:4.5.0-23.3.0.1.module+el8.0.0.z+5234+5e9073e3
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.5.0-23.2.0.1.module+el8.0.0+5225+ce2eb65e
  • H
Out-of-Bounds

<0:4.5.0-23.1.0.1.module+el8.0.0+5219+3c0c6858
  • H
Integer Overflow or Wraparound

<0:4.5.0-23.1.0.1.module+el8.0.0+5219+3c0c6858
  • H
Integer Overflow or Wraparound

<0:4.5.0-23.1.0.1.module+el8.0.0+5219+3c0c6858
  • H
Information Exposure

<0:4.5.0-23.1.0.1.module+el8.0.0+5219+3c0c6858
  • H
CVE-2019-11091

<0:4.5.0-23.1.0.1.module+el8.0.0+5219+3c0c6858
  • H
Information Exposure

<0:4.5.0-23.1.0.1.module+el8.0.0+5219+3c0c6858
  • H
Information Exposure

<0:4.5.0-23.1.0.1.module+el8.0.0+5219+3c0c6858
  • H
Integer Overflow or Wraparound

<0:4.5.0-23.1.0.1.module+el8.0.0+5219+3c0c6858
  • H
Out-of-bounds Write

<0:4.5.0-23.1.0.1.module+el8.0.0+5219+3c0c6858