cpe:2.3:a:libvirt:libvirt:0.7.4:*:*:*:*:*:*:*
libvirt before 2.2 includes Ceph credentials on the qemu command line when using RADOS Block Device (aka RBD), which allows local users to obtain sensitive information via a process listing.
Max CVSS
5.5
EPSS Score
0.04%
Published
2018-08-20
Updated
2020-10-15
The virDomainListPopulate function in conf/domain_conf.c in libvirt before 1.2.9 does not clean up the lock on the list of domains, which allows remote attackers to cause a denial of service (deadlock) via a NULL value in the second parameter in the virConnectListAllDomains API command.
Max CVSS
5.0
EPSS Score
4.21%
Published
2014-10-06
Updated
2023-02-13
The qemuDomainGetBlockIoTune function in qemu/qemu_driver.c in libvirt before 1.2.9, when a disk has been hot-plugged or removed from the live image, allows remote attackers to cause a denial of service (crash) or read sensitive heap information via a crafted blkiotune query, which triggers an out-of-bounds read.
Max CVSS
5.8
EPSS Score
3.88%
Published
2014-10-06
Updated
2023-02-13
Red Hat libvirt, possibly 0.6.0 through 0.8.2, creates new images without setting the user-defined backing-store format, which allows guest OS users to read arbitrary files on the host OS via unspecified vectors.
Max CVSS
4.4
EPSS Score
0.06%
Published
2010-08-19
Updated
2010-10-30
Red Hat libvirt, possibly 0.7.2 through 0.8.2, recurses into disk-image backing stores without extracting the defined disk backing-store format, which might allow guest OS users to read arbitrary files on the host OS, and possibly have unspecified other impact, via unknown vectors.
Max CVSS
4.4
EPSS Score
0.06%
Published
2010-08-19
Updated
2010-10-30
Red Hat libvirt, possibly 0.6.1 through 0.8.2, looks up disk backing stores without referring to the user-defined main disk format, which might allow guest OS users to read arbitrary files on the host OS, and possibly have unspecified other impact, via unknown vectors.
Max CVSS
4.4
EPSS Score
0.06%
Published
2010-08-19
Updated
2010-10-30
6 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!