Redhat

Libvirt

73 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Veröffentlicht 30.07.2019 23:15:12
  • Zuletzt bearbeitet 21.11.2024 04:18:32

It was discovered that libvirtd before versions 4.10.1 and 5.4.1 would permit read-only clients to use the virDomainSaveImageGetXMLDesc() API, specifying an arbitrary path which would be accessed with the permissions of the libvirtd process. An attac...

  • EPSS 1.21%
  • Veröffentlicht 22.05.2019 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:18:29

A vulnerability was found in libvirt >= 4.1.0 in the virtlockd-admin.socket and virtlogd-admin.socket systemd units. A missing SocketMode configuration parameter allows any user on the host to connect using virtlockd-admin-sock or virtlogd-admin-sock...

  • EPSS 0.56%
  • Veröffentlicht 18.04.2019 16:29:00
  • Zuletzt bearbeitet 21.11.2024 02:44:39

libvirt-domain.c in libvirt before 1.3.1 supports virDomainGetTime API calls by guest agents with an RO connection, even though an RW connection was supposed to be required, a different vulnerability than CVE-2019-3886.

Exploit
  • EPSS 0.53%
  • Veröffentlicht 04.04.2019 16:29:03
  • Zuletzt bearbeitet 21.11.2024 04:42:47

An incorrect permissions check was discovered in libvirt 4.8.0 and above. The readonly permission was allowed to invoke APIs depending on the guest agent, which could lead to potentially disclosing unintended information or denial of service by causi...

Exploit
  • EPSS 0.75%
  • Veröffentlicht 27.03.2019 13:29:01
  • Zuletzt bearbeitet 21.11.2024 04:42:40

A NULL pointer dereference flaw was discovered in libvirt before version 5.0.0 in the way it gets interface information through the QEMU agent. An attacker in a guest VM can use this flaw to crash libvirtd and cause a denial of service.

  • EPSS 0.32%
  • Veröffentlicht 22.08.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 03:23:52

A NULL pointer deference flaw was found in the way libvirt from 2.5.0 to 3.0.0 handled empty drives. A remote authenticated attacker could use this flaw to crash libvirtd daemon resulting in denial of service.

  • EPSS 1.29%
  • Veröffentlicht 28.03.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:59:06

libvirt version before 4.2.0-rc1 is vulnerable to a resource exhaustion as a result of an incomplete fix for CVE-2018-5748 that affects QEMU monitor but now also triggered via QEMU guest agent.

  • EPSS 0.04%
  • Veröffentlicht 23.02.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 04:11:08

util/virlog.c in libvirt does not properly determine the hostname on LXC container startup, which allows local guest OS users to bypass an intended container protection mechanism and execute arbitrary commands via a crafted NSS module.

  • EPSS 1.36%
  • Veröffentlicht 25.01.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 04:09:18

qemu/qemu_monitor.c in libvirt allows attackers to cause a denial of service (memory consumption) via a large QEMU reply.

  • EPSS 0.78%
  • Veröffentlicht 31.10.2017 15:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

libvirt version 2.3.0 and later is vulnerable to a bad default configuration of "verify-peer=no" passed to QEMU by libvirt resulting in a failure to validate SSL/TLS certificates by default.