Libvirt

Libvirt

12 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Published 21.03.2024 14:15:10
  • Last modified 21.11.2024 09:09:52

A flaw was found in the RPC library APIs of libvirt. The RPC server deserialization code allocates memory for arrays before the non-negative length check is performed by the C API entry points. Passing a negative length to the g_new0 function results...

  • EPSS 0.03%
  • Published 18.03.2024 13:15:08
  • Last modified 09.04.2025 15:36:43

A NULL pointer dereference flaw was found in the udevConnectListAllInterfaces() function in libvirt. This issue can occur when detaching a host interface while at the same time collecting the list of interfaces via virConnectListAllInterfaces API. Th...

  • EPSS 0.07%
  • Published 11.03.2024 14:15:06
  • Last modified 11.04.2025 22:15:29

An off-by-one error flaw was found in the udevListInterfacesByStatus() function in libvirt when the number of interfaces exceeds the size of the `names` array. This issue can be reproduced by sending specially crafted data to the libvirt daemon, allo...

  • EPSS 0.15%
  • Published 20.08.2018 21:29:00
  • Last modified 21.11.2024 02:32:28

libvirt before 2.2 includes Ceph credentials on the qemu command line when using RADOS Block Device (aka RBD), which allows local users to obtain sensitive information via a process listing.

  • EPSS 3.7%
  • Published 06.10.2014 14:55:10
  • Last modified 12.04.2025 10:46:40

The qemuDomainGetBlockIoTune function in qemu/qemu_driver.c in libvirt before 1.2.9, when a disk has been hot-plugged or removed from the live image, allows remote attackers to cause a denial of service (crash) or read sensitive heap information via ...

  • EPSS 1.5%
  • Published 06.10.2014 14:55:10
  • Last modified 12.04.2025 10:46:40

The virDomainListPopulate function in conf/domain_conf.c in libvirt before 1.2.9 does not clean up the lock on the list of domains, which allows remote attackers to cause a denial of service (deadlock) via a NULL value in the second parameter in the ...

  • EPSS 0.07%
  • Published 19.08.2010 18:00:03
  • Last modified 11.04.2025 00:51:21

Red Hat libvirt, possibly 0.6.1 through 0.8.2, looks up disk backing stores without referring to the user-defined main disk format, which might allow guest OS users to read arbitrary files on the host OS, and possibly have unspecified other impact, v...

  • EPSS 0.07%
  • Published 19.08.2010 18:00:03
  • Last modified 11.04.2025 00:51:21

Red Hat libvirt, possibly 0.7.2 through 0.8.2, recurses into disk-image backing stores without extracting the defined disk backing-store format, which might allow guest OS users to read arbitrary files on the host OS, and possibly have unspecified ot...

  • EPSS 0.07%
  • Published 19.08.2010 18:00:03
  • Last modified 11.04.2025 00:51:21

Red Hat libvirt, possibly 0.6.0 through 0.8.2, creates new images without setting the user-defined backing-store format, which allows guest OS users to read arbitrary files on the host OS via unspecified vectors.

  • EPSS 0.08%
  • Published 19.08.2010 18:00:03
  • Last modified 11.04.2025 00:51:21

Red Hat libvirt 0.2.0 through 0.8.2 creates iptables rules with improper mappings of privileged source ports, which allows guest OS users to bypass intended access restrictions by leveraging IP address and source-port values, as demonstrated by copyi...