libvirt-nss

Direct Vulnerabilities

Known vulnerabilities in the libvirt-nss package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Incorrect Default Permissions

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • H
Sensitive Information Uncleared Before Release

<0:3.9.0-14.el7
  • H
Sensitive Information Uncleared Before Release

<0:3.9.0-14.el7
  • H
Sensitive Information Uncleared Before Release

<0:3.9.0-14.el7
  • H
Sensitive Information Uncleared Before Release

<0:3.9.0-14.el7
  • H
Sensitive Information Uncleared Before Release

<0:3.9.0-14.el7
  • H
Sensitive Information Uncleared Before Release

<0:3.9.0-14.el7
  • H
Sensitive Information Uncleared Before Release

<0:3.9.0-14.el7
  • H
Sensitive Information Uncleared Before Release

<0:3.9.0-14.el7
  • H
Sensitive Information Uncleared Before Release

<0:3.9.0-14.el7
  • H
Sensitive Information Uncleared Before Release

<0:3.9.0-14.el7
  • M
NULL Pointer Dereference

<0:4.5.0-23.el7
  • M
Incorrect Behavior Order: Early Validation

<0:4.5.0-10.el7
  • L
Resource Exhaustion

<0:3.9.0-14.el7_5.4
  • L
Resource Exhaustion

<0:3.9.0-14.el7_5.4
  • M
Double Free

<0:4.5.0-36.el7_9.3
  • M
NULL Pointer Dereference

<0:4.5.0-36.el7
  • M
Resource Exhaustion

<0:4.5.0-36.el7
  • H
Covert Storage Channel

<0:4.5.0-10.el7_6.9
  • H
Information Exposure

<0:4.5.0-10.el7_6.9
  • H
Covert Timing Channel

<0:4.5.0-10.el7_6.9
  • H
Covert Storage Channel

<0:4.5.0-10.el7_6.9
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.5.0-10.el7_6.10
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:4.5.0-10.el7_6.12
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:4.5.0-10.el7_6.12
  • H
Improper Access Control

<0:4.5.0-10.el7_6.12
  • H
Improper Access Control

<0:4.5.0-10.el7_6.12
  • H
Sensitive Information Uncleared Before Release

<0:3.9.0-14.el7_5.6
  • M
Improper Access Control

<0:2.0.0-10.el7
  • M
Directory Traversal

<0:2.0.0-10.el7
  • M
Information Exposure

<0:2.0.0-10.el7
  • M
Return of Stack Variable Address

*
  • M
Uncontrolled Memory Allocation

*
  • M
NULL Pointer Dereference

*
  • M
Off-by-one Error

*
  • M
Memory Leak

*
  • L
Improper Locking

*
  • L
Use After Free

*
  • L
Improper Locking

*
  • M
NULL Pointer Dereference

<0:4.5.0-23.el7
  • M
NULL Pointer Dereference

<0:4.5.0-23.el7
  • M
NULL Pointer Dereference

<0:4.5.0-23.el7
  • M
NULL Pointer Dereference

<0:4.5.0-23.el7
  • M
NULL Pointer Dereference

<0:4.5.0-23.el7
  • M
Incorrect Behavior Order: Early Validation

<0:4.5.0-10.el7
  • M
Incorrect Behavior Order: Early Validation

<0:4.5.0-10.el7
  • M
Incorrect Behavior Order: Early Validation

<0:4.5.0-10.el7
  • M
Incorrect Behavior Order: Early Validation

<0:4.5.0-10.el7
  • M
Incorrect Behavior Order: Early Validation

<0:4.5.0-10.el7
  • M
Incorrect Behavior Order: Early Validation

<0:4.5.0-10.el7
  • M
Incorrect Behavior Order: Early Validation

<0:4.5.0-10.el7
  • M
Incorrect Behavior Order: Early Validation

<0:4.5.0-10.el7
  • M
Incorrect Behavior Order: Early Validation

<0:4.5.0-10.el7
  • H
Sensitive Information Uncleared Before Release

<0:3.2.0-14.el7_4.11
  • H
Sensitive Information Uncleared Before Release

<0:3.9.0-14.el7_5.5
  • H
Sensitive Information Uncleared Before Release

<0:3.9.0-14.el7_5.6
  • H
Sensitive Information Uncleared Before Release

<0:2.0.0-10.el7_3.13
  • H
Sensitive Information Uncleared Before Release

<0:3.9.0-14.el7_5.6
  • H
Sensitive Information Uncleared Before Release

<0:3.9.0-14.el7_5.6
  • H
Sensitive Information Uncleared Before Release

<0:3.2.0-14.el7_4.11
  • H
Sensitive Information Uncleared Before Release

<0:3.9.0-14.el7_5.6
  • H
Sensitive Information Uncleared Before Release

<0:3.2.0-14.el7_4.10
  • H
Sensitive Information Uncleared Before Release

<0:3.2.0-14.el7_4.11
  • H
Sensitive Information Uncleared Before Release

<0:2.0.0-10.el7_3.13
  • H
Sensitive Information Uncleared Before Release

<0:3.9.0-14.el7_5.5
  • H
Sensitive Information Uncleared Before Release

<0:3.9.0-14.el7_5.5
  • H
Sensitive Information Uncleared Before Release

<0:3.9.0-14.el7_5.6
  • H
Sensitive Information Uncleared Before Release

<0:3.9.0-14.el7_5.6
  • H
Sensitive Information Uncleared Before Release

<0:2.0.0-10.el7_3.12
  • H
Sensitive Information Uncleared Before Release

<0:2.0.0-10.el7_3.12
  • H
Sensitive Information Uncleared Before Release

<0:3.9.0-14.el7_5.5
  • L
Resource Exhaustion

<0:3.9.0-14.el7_5.4
  • L
Resource Exhaustion

<0:3.9.0-14.el7_5.4
  • L
Resource Exhaustion

<0:3.9.0-14.el7_5.4
  • L
Resource Exhaustion

<0:3.9.0-14.el7_5.4
  • L
Resource Exhaustion

<0:3.9.0-14.el7_5.4
  • L
Resource Exhaustion

<0:3.9.0-14.el7_5.4
  • L
Resource Exhaustion

<0:3.9.0-14.el7_5.4
  • L
Resource Exhaustion

<0:3.9.0-14.el7_5.4
  • L
Resource Exhaustion

<0:3.9.0-14.el7_5.4
  • L
Resource Exhaustion

<0:3.9.0-14.el7_5.4
  • L
Resource Exhaustion

<0:3.9.0-14.el7_5.4
  • L
Resource Exhaustion

<0:3.9.0-14.el7_5.4
  • L
Resource Exhaustion

<0:3.9.0-14.el7_5.4
  • L
Resource Exhaustion

<0:3.9.0-14.el7_5.4
  • L
Resource Exhaustion

<0:3.9.0-14.el7_5.4
  • L
Resource Exhaustion

<0:3.9.0-14.el7_5.4
  • L
Resource Exhaustion

<0:3.9.0-14.el7_5.4
  • L
Resource Exhaustion

<0:3.9.0-14.el7_5.4
  • L
Resource Exhaustion

<0:3.9.0-14.el7_5.4
  • L
Resource Exhaustion

<0:3.9.0-14.el7_5.4
  • M
Double Free

<0:4.5.0-36.el7_9.3
  • M
NULL Pointer Dereference

<0:4.5.0-36.el7
  • H
Sensitive Information Uncleared Before Release

<0:3.9.0-14.el7
  • M
Resource Exhaustion

<0:4.5.0-36.el7
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:4.5.0-10.el7_6.12
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:4.5.0-10.el7_6.12
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:4.5.0-10.el7_6.12
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:4.5.0-10.el7_6.12
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:4.5.0-10.el7_6.12
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:4.5.0-10.el7_6.12
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:4.5.0-10.el7_6.12
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:4.5.0-10.el7_6.12
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:4.5.0-10.el7_6.12
  • H
Improper Access Control

<0:4.5.0-10.el7_6.12
  • H
Improper Access Control

<0:4.5.0-10.el7_6.12
  • H
Improper Access Control

<0:4.5.0-10.el7_6.12
  • H
Improper Access Control

<0:4.5.0-10.el7_6.12
  • H
Improper Access Control

<0:4.5.0-10.el7_6.12
  • H
Improper Access Control

<0:4.5.0-10.el7_6.12
  • H
Improper Access Control

<0:4.5.0-10.el7_6.12
  • H
Improper Access Control

<0:4.5.0-10.el7_6.12
  • H
Improper Access Control

<0:4.5.0-10.el7_6.12
  • H
Improper Access Control

<0:4.5.0-10.el7_6.12
  • H
Improper Access Control

<0:4.5.0-10.el7_6.12
  • H
Improper Access Control

<0:4.5.0-10.el7_6.12
  • H
Improper Access Control

<0:4.5.0-10.el7_6.12
  • H
Improper Access Control

<0:4.5.0-10.el7_6.12
  • H
Improper Access Control

<0:4.5.0-10.el7_6.12
  • H
Improper Access Control

<0:4.5.0-10.el7_6.12
  • H
Improper Access Control

<0:4.5.0-10.el7_6.12
  • H
Improper Access Control

<0:4.5.0-10.el7_6.12
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:4.5.0-10.el7_6.12
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:4.5.0-10.el7_6.12
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:4.5.0-10.el7_6.12
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:4.5.0-10.el7_6.12
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:4.5.0-10.el7_6.12
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:4.5.0-10.el7_6.12
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:4.5.0-10.el7_6.12
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:4.5.0-10.el7_6.12
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:4.5.0-10.el7_6.12
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.5.0-10.el7_6.10
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.5.0-10.el7_6.10
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.5.0-10.el7_6.10
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.5.0-10.el7_6.10
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.5.0-10.el7_6.10
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.5.0-10.el7_6.10
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.5.0-10.el7_6.10
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.5.0-10.el7_6.10
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.5.0-10.el7_6.10
  • H
Covert Storage Channel

<0:3.2.0-14.el7_4.13
  • H
Covert Storage Channel

<0:4.5.0-10.el7_6.9
  • H
Covert Storage Channel

<0:4.5.0-10.el7_6.9
  • H
Covert Storage Channel

<0:4.5.0-10.el7_6.9
  • H
Covert Storage Channel

<0:4.5.0-10.el7_6.9
  • H
Covert Storage Channel

<0:3.2.0-14.el7_4.13
  • H
Covert Storage Channel

<0:4.5.0-10.el7_6.9
  • H
Covert Storage Channel

<0:4.5.0-10.el7_6.9
  • H
Covert Storage Channel

<0:4.5.0-10.el7_6.9
  • H
Covert Storage Channel

<0:4.5.0-10.el7_6.9
  • H
Covert Storage Channel

<0:4.5.0-10.el7_6.9
  • H
Covert Storage Channel

<0:3.2.0-14.el7_4.13
  • H
Covert Storage Channel

<0:2.0.0-10.el7_3.14
  • H
Covert Storage Channel

<0:2.0.0-10.el7_3.14
  • H
Covert Storage Channel

<0:3.9.0-14.el7_5.9
  • H
Covert Storage Channel

<0:3.2.0-14.el7_4.13
  • H
Covert Storage Channel

<0:2.0.0-10.el7_3.14
  • H
Information Exposure

<0:2.0.0-10.el7_3.14
  • H
Information Exposure

<0:4.5.0-10.el7_6.9
  • H
Information Exposure

<0:3.2.0-14.el7_4.13
  • H
Information Exposure

<0:4.5.0-10.el7_6.9
  • H
Information Exposure

<0:4.5.0-10.el7_6.9
  • H
Information Exposure

<0:2.0.0-10.el7_3.14
  • H
Information Exposure

<0:3.9.0-14.el7_5.9
  • H
Information Exposure

<0:3.2.0-14.el7_4.13
  • H
Information Exposure

<0:4.5.0-10.el7_6.9
  • H
Information Exposure

<0:3.2.0-14.el7_4.13
  • H
Information Exposure

<0:4.5.0-10.el7_6.9
  • H
Information Exposure

<0:4.5.0-10.el7_6.9
  • H
Information Exposure

<0:4.5.0-10.el7_6.9
  • H
Information Exposure

<0:3.2.0-14.el7_4.13
  • H
Information Exposure

<0:4.5.0-10.el7_6.9
  • H
Information Exposure

<0:2.0.0-10.el7_3.14
  • H
Information Exposure

<0:4.5.0-10.el7_6.9
  • H
Covert Timing Channel

<0:4.5.0-10.el7_6.9
  • H
Covert Timing Channel

<0:4.5.0-10.el7_6.9
  • H
Covert Timing Channel

<0:3.2.0-14.el7_4.13
  • H
Covert Timing Channel

<0:4.5.0-10.el7_6.9
  • H
Covert Timing Channel

<0:4.5.0-10.el7_6.9
  • H
Covert Timing Channel

<0:3.9.0-14.el7_5.9
  • H
Covert Timing Channel

<0:2.0.0-10.el7_3.14
  • H
Covert Timing Channel

<0:3.2.0-14.el7_4.13
  • H
Covert Timing Channel

<0:3.2.0-14.el7_4.13
  • H
Covert Timing Channel

<0:4.5.0-10.el7_6.9
  • H
Covert Timing Channel

<0:2.0.0-10.el7_3.14
  • H
Covert Timing Channel

<0:4.5.0-10.el7_6.9
  • H
Covert Timing Channel

<0:4.5.0-10.el7_6.9
  • H
Covert Timing Channel

<0:2.0.0-10.el7_3.14
  • H
Covert Timing Channel

<0:4.5.0-10.el7_6.9
  • H
Covert Timing Channel

<0:3.2.0-14.el7_4.13
  • H
Covert Timing Channel

<0:4.5.0-10.el7_6.9
  • H
Covert Storage Channel

<0:4.5.0-10.el7_6.9
  • H
Covert Storage Channel

<0:4.5.0-10.el7_6.9
  • H
Covert Storage Channel

<0:2.0.0-10.el7_3.14
  • H
Covert Storage Channel

<0:4.5.0-10.el7_6.9
  • H
Covert Storage Channel

<0:4.5.0-10.el7_6.9
  • H
Covert Storage Channel

<0:4.5.0-10.el7_6.9
  • H
Covert Storage Channel

<0:3.2.0-14.el7_4.13
  • H
Covert Storage Channel

<0:4.5.0-10.el7_6.9
  • H
Covert Storage Channel

<0:2.0.0-10.el7_3.14
  • H
Covert Storage Channel

<0:4.5.0-10.el7_6.9
  • H
Covert Storage Channel

<0:4.5.0-10.el7_6.9
  • H
Covert Storage Channel

<0:3.2.0-14.el7_4.13
  • H
Covert Storage Channel

<0:2.0.0-10.el7_3.14
  • H
Covert Storage Channel

<0:3.2.0-14.el7_4.13
  • H
Covert Storage Channel

<0:3.9.0-14.el7_5.9
  • H
Covert Storage Channel

<0:4.5.0-10.el7_6.9
  • H
Covert Storage Channel

<0:3.2.0-14.el7_4.13
  • L
Incorrect Permission Assignment for Critical Resource

*
  • L
Improper Certificate Validation

*
  • M
Improper Access Control

<0:2.0.0-10.el7
  • M
Improper Access Control

<0:2.0.0-10.el7
  • M
Improper Access Control

<0:2.0.0-10.el7
  • M
Improper Access Control

<0:2.0.0-10.el7
  • M
Improper Access Control

<0:2.0.0-10.el7
  • M
Improper Access Control

<0:2.0.0-10.el7
  • M
Improper Access Control

<0:2.0.0-10.el7
  • M
Improper Access Control

<0:2.0.0-10.el7
  • M
Improper Access Control

<0:2.0.0-10.el7
  • M
Improper Access Control

<0:2.0.0-10.el7
  • M
Improper Access Control

<0:2.0.0-10.el7
  • M
Improper Access Control

<0:2.0.0-10.el7
  • M
Improper Access Control

<0:2.0.0-10.el7
  • M
Improper Access Control

<0:2.0.0-10.el7
  • M
Improper Access Control

<0:2.0.0-10.el7
  • M
Improper Access Control

<0:2.0.0-10.el7
  • M
Improper Access Control

<0:2.0.0-10.el7
  • M
Improper Access Control

<0:2.0.0-10.el7
  • M
Improper Access Control

<0:2.0.0-10.el7
  • M
Improper Access Control

<0:2.0.0-10.el7
  • M
Improper Access Control

<0:2.0.0-10.el7
  • M
Improper Access Control

<0:2.0.0-10.el7
  • M
Improper Access Control

<0:2.0.0-10.el7
  • M
Directory Traversal

<0:2.0.0-10.el7
  • M
Directory Traversal

<0:2.0.0-10.el7
  • M
Directory Traversal

<0:2.0.0-10.el7
  • M
Directory Traversal

<0:2.0.0-10.el7
  • M
Directory Traversal

<0:2.0.0-10.el7
  • M
Directory Traversal

<0:2.0.0-10.el7
  • M
Directory Traversal

<0:2.0.0-10.el7
  • M
Directory Traversal

<0:2.0.0-10.el7
  • M
Directory Traversal

<0:2.0.0-10.el7
  • M
Directory Traversal

<0:2.0.0-10.el7
  • M
Directory Traversal

<0:2.0.0-10.el7
  • M
Directory Traversal

<0:2.0.0-10.el7
  • M
Directory Traversal

<0:2.0.0-10.el7
  • M
Directory Traversal

<0:2.0.0-10.el7
  • M
Directory Traversal

<0:2.0.0-10.el7
  • M
Directory Traversal

<0:2.0.0-10.el7
  • M
Directory Traversal

<0:2.0.0-10.el7
  • M
Directory Traversal

<0:2.0.0-10.el7
  • M
Directory Traversal

<0:2.0.0-10.el7
  • M
Directory Traversal

<0:2.0.0-10.el7
  • M
Directory Traversal

<0:2.0.0-10.el7
  • M
Directory Traversal

<0:2.0.0-10.el7
  • M
Directory Traversal

<0:2.0.0-10.el7
  • M
Information Exposure

<0:2.0.0-10.el7
  • M
Information Exposure

<0:2.0.0-10.el7
  • M
Information Exposure

<0:2.0.0-10.el7
  • M
Information Exposure

<0:2.0.0-10.el7
  • M
Information Exposure

<0:2.0.0-10.el7
  • M
Information Exposure

<0:2.0.0-10.el7
  • M
Information Exposure

<0:2.0.0-10.el7
  • M
Information Exposure

<0:2.0.0-10.el7
  • M
Information Exposure

<0:2.0.0-10.el7
  • M
Information Exposure

<0:2.0.0-10.el7
  • M
Information Exposure

<0:2.0.0-10.el7
  • M
Information Exposure

<0:2.0.0-10.el7
  • M
Information Exposure

<0:2.0.0-10.el7
  • M
Information Exposure

<0:2.0.0-10.el7
  • M
Information Exposure

<0:2.0.0-10.el7
  • M
Information Exposure

<0:2.0.0-10.el7
  • M
Information Exposure

<0:2.0.0-10.el7
  • M
Information Exposure

<0:2.0.0-10.el7
  • M
Information Exposure

<0:2.0.0-10.el7
  • M
Information Exposure

<0:2.0.0-10.el7
  • M
Information Exposure

<0:2.0.0-10.el7
  • M
Information Exposure

<0:2.0.0-10.el7
  • M
Information Exposure

<0:2.0.0-10.el7
  • M
Race Condition

*
  • M
Access Restriction Bypass

*
  • M
Link Following

*