Debian Libvirt vulnerabilities
87 known vulnerabilities affecting debian/libvirt.
Total CVEs
87
CISA KEV
0
Public exploits
2
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH15MEDIUM39LOW32
Vulnerabilities
Page 5 of 5
CVE-2011-1486LOWCVSS 3.3fixed in libvirt 0.9.0-1 (bookworm)2011
CVE-2011-1486 [LOW] CVE-2011-1486: libvirt - libvirtd in libvirt before 0.9.0 does not use thread-safe error reporting, which...
libvirtd in libvirt before 0.9.0 does not use thread-safe error reporting, which allows remote attackers to cause a denial of service (crash) by causing multiple threads to report errors at the same time.
Scope: local
bookworm: resolved (fixed in 0.9.0-1)
bullseye: resolved (fixed in 0.9.0-1)
forky: resolved (fixed in 0.9.0-1)
sid: resolved (fixed in 0.9.0-1)
trixie: r
debian
CVE-2010-2238MEDIUMCVSS 4.4fixed in libvirt 0.8.3-1 (bookworm)2010
CVE-2010-2238 [MEDIUM] CVE-2010-2238: libvirt - Red Hat libvirt, possibly 0.7.2 through 0.8.2, recurses into disk-image backing ...
Red Hat libvirt, possibly 0.7.2 through 0.8.2, recurses into disk-image backing stores without extracting the defined disk backing-store format, which might allow guest OS users to read arbitrary files on the host OS, and possibly have unspecified other impact, via unknown vectors.
Scope: local
bookworm: resolved (fixed in 0.8.3-1)
bullseye: resolved (fixed in 0.8.3
debian
CVE-2010-2237MEDIUMCVSS 4.4fixed in libvirt 0.8.3-1 (bookworm)2010
CVE-2010-2237 [MEDIUM] CVE-2010-2237: libvirt - Red Hat libvirt, possibly 0.6.1 through 0.8.2, looks up disk backing stores with...
Red Hat libvirt, possibly 0.6.1 through 0.8.2, looks up disk backing stores without referring to the user-defined main disk format, which might allow guest OS users to read arbitrary files on the host OS, and possibly have unspecified other impact, via unknown vectors.
Scope: local
bookworm: resolved (fixed in 0.8.3-1)
bullseye: resolved (fixed in 0.8.3-1)
forky: re
debian
CVE-2010-2242LOWCVSS 2.1fixed in libvirt 0.8.3-1 (bookworm)2010
CVE-2010-2242 [LOW] CVE-2010-2242: libvirt - Red Hat libvirt 0.2.0 through 0.8.2 creates iptables rules with improper mapping...
Red Hat libvirt 0.2.0 through 0.8.2 creates iptables rules with improper mappings of privileged source ports, which allows guest OS users to bypass intended access restrictions by leveraging IP address and source-port values, as demonstrated by copying and deleting an NFS directory tree.
Scope: local
bookworm: resolved (fixed in 0.8.3-1)
bullseye: resolved (fixed in 0.
debian
CVE-2010-2239LOWCVSS 4.4fixed in libvirt 0.8.3-1 (bookworm)2010
CVE-2010-2239 [MEDIUM] CVE-2010-2239: libvirt - Red Hat libvirt, possibly 0.6.0 through 0.8.2, creates new images without settin...
Red Hat libvirt, possibly 0.6.0 through 0.8.2, creates new images without setting the user-defined backing-store format, which allows guest OS users to read arbitrary files on the host OS via unspecified vectors.
Scope: local
bookworm: resolved (fixed in 0.8.3-1)
bullseye: resolved (fixed in 0.8.3-1)
forky: resolved (fixed in 0.8.3-1)
sid: resolved (fixed in 0.8.3-1
debian
CVE-2009-0036LOWCVSS 4.4PoCfixed in libvirt 0.5.1-7 (bookworm)2009
CVE-2009-0036 [MEDIUM] CVE-2009-0036: libvirt - Buffer overflow in the proxyReadClientSocket function in proxy/libvirt_proxy.c i...
Buffer overflow in the proxyReadClientSocket function in proxy/libvirt_proxy.c in libvirt_proxy 0.5.1 might allow local users to gain privileges by sending a portion of the header of a virProxyPacket packet, and then sending the remainder of the packet with crafted values in the header, related to use of uninitialized memory in a validation check.
Scope: local
bookw
debian
CVE-2008-5086HIGHCVSS 7.2fixed in libvirt 0.4.6-10 (bookworm)2008
CVE-2008-5086 [HIGH] CVE-2008-5086: libvirt - Multiple methods in libvirt 0.3.2 through 0.5.1 do not check if a connection is ...
Multiple methods in libvirt 0.3.2 through 0.5.1 do not check if a connection is read-only, which allows local users to bypass intended access restrictions and perform administrative actions.
Scope: local
bookworm: resolved (fixed in 0.4.6-10)
bullseye: resolved (fixed in 0.4.6-10)
forky: resolved (fixed in 0.4.6-10)
sid: resolved (fixed in 0.4.6-10)
trixie: resolved (
debian
← Previous5 / 5