libvirt vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://libvirt.org|libvirt package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
NULL Pointer Dereference

[10.4.0,10.7.0)
  • M
Use After Free

[0,)
  • M
Uncontrolled Resource Consumption

[0,)
  • M
NULL Pointer Dereference

[,9.8.0)
  • M
Off-by-one Error

[,10.1.0)
  • M
Improper Locking

[0,)
  • M
Denial of Service (DoS)

[,9.3.0)
  • M
Incorrect Permission Assignment for Critical Resource

[,7.5.0)
  • M
Improper Locking

[,7.6.0-rc1)
  • M
Denial of Service (DoS)

[,8.0.0-rc1)
  • M
Denial of Service (DoS)

[,8.2.0-rc1)
  • H
Denial of Service (DoS)

[0,)
  • H
User Impersonation

[0,)
  • L
Directory Traversal

[0,)
  • M
Information Exposure

[,2.2)
  • M
Access Restriction Bypass

[0.2.0,0.8.2]
  • H
Access Restriction Bypass

[0.3.2,0.5.1]
  • H
Access Restriction Bypass

[1.1.0,1.1.3]
  • M
Double Free

[,6.8.0)
  • M
Access Restriction Bypass

[0.7.2,0.8.2]
  • L
Improper Input Validation

[,1.2.5)
  • M
Memory Leak

[4.10.0,6.1.0)
  • M
Out-of-Bounds

[,1.1.1]
  • M
Improper Input Validation

[,1.1.1)
  • M
Out-of-Bounds

[,1.2.9)
  • M
Out-of-Bounds

[,0.5.1]
  • M
Access Restriction Bypass

[0.6.0,0.8.2]
  • M
Out-of-Bounds

[,1.1.3)
  • M
Symlink Attack

[1.0.1,1.2.1]
  • M
Denial of Service (DoS)

[,1.1.1)
  • M
Access Restriction Bypass

[,6.2.0)
  • H
Memory Leak

[6.2.0,6.7.0)
  • M
Denial of Service (DoS)

[,0.9.3)
  • H
Directory Traversal

[,4.10.1)[5.0.0,5.4.1)
  • M
Resource Management Errors

[,1.2.9)
  • M
Insufficiently Protected Credentials

[,1.2.11)
  • M
Out-of-Bounds

[,0.10.2.8)[1.0.5.0,1.0.5.6)[1.1.0,1.1.2)
  • M
Improper Input Validation

[,6.0.0)
  • M
Out-of-Bounds

[,1.1.2)
  • M
Improper Cross-boundary Removal of Sensitive Data

[6.2.0,6.3.0)
  • H
Security Features

[,1.3.1)
  • L
Denial of Service (DoS)

[,1.1.3)
  • M
Resource Management Errors

[,1.0.5]
  • M
Access Restriction Bypass

[1.1.1,1.2.0]
  • M
Denial of Service (DoS)

[,1.1.3.1)
  • M
Access Restriction Bypass

[1.0.5,1.2.0]
  • L
Information Exposure

[,1.2.12)
  • M
Information Exposure

[4.8.0,5.3.0)
  • H
Access Restriction Bypass

[,4.2.0)
  • M
NULL Pointer Dereference

[2.5.0,3.1.0)
  • M
Access Restriction Bypass

[,0.9.11.1)
  • H
Access Restriction Bypass

[0.10.2.7,1.1.1]
  • M
NULL Pointer Dereference

[3.10.0,6.0.0)
  • M
Access Restriction Bypass

[0.6.1,0.8.2]
  • M
Access Restriction Bypass

[,1.0.3)
  • H
Improper Access Control

[4.0.0,4.10.1)[5.0.0,5.4.1)
  • H
Directory Traversal

[4.0.0,4.10.1)[5.0.0,5.4.1)
  • M
Access Restriction Bypass

[,1.2.1)
  • M
Use After Free

[0.9.6,0.9.6.4)[0.9.11,0.9.11.9)[0.10.2,0.10.2.3)[1.0.0,1.0.2)
  • M
Resource Management Errors

[,0.9.0)
  • H
Improper Certificate Validation

[2.3.0,3.9.0)
  • M
NULL Pointer Dereference

[,5.0.0)
  • L
Resource Management Errors

[,0.9.13]
  • M
Improper Access Control

[,0.9.9)
  • H
Access Restriction Bypass

[,0.8.8]
  • H
Access Restriction Bypass

[1.1.2,1.1.3]
  • M
Access Restriction Bypass

[,0.9.12.2)[0.10.2.0,0.10.2.8)[1.0.5.0,1.0.5.6)
  • M
Improper Access Control

[1.2.14,1.2.19]
  • M
Denial of Service (DoS)

[,0.10.2)
  • M
Out-of-Bounds

[6.10.0,7.0.0)
  • M
Resource Management Errors

[1.0.6,1.1.0]
  • L
Improper Input Validation

[,1.2.5)
  • H
Denial of Service (DoS)

[,4.2.0)
  • M
Arbitrary Code Execution

[0.8.8,0.9.1]
  • H
Directory Traversal

[4.0.0,4.10.1)[5.0.0,5.4.1)
  • M
Resource Management Errors

[,1.0.6]
  • H
Race Condition

[,1.2.1)
  • C
Improper Access Control

[,2.0.0)
  • M
Access Restriction Bypass

[,1.2.11)
  • M
Resource Management Errors

[1.1.0,1.1.1]
  • M
Denial of Service (DoS)

[,1.3.0)
  • M
Race Condition

[,1.2.1)