Vulnerabilities > Libvirt
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-08-20 | CVE-2015-5160 | Information Exposure vulnerability in multiple products libvirt before 2.2 includes Ceph credentials on the qemu command line when using RADOS Block Device (aka RBD), which allows local users to obtain sensitive information via a process listing. | 2.1 |
2010-08-19 | CVE-2010-2242 | Permissions, Privileges, and Access Controls vulnerability in Libvirt Red Hat libvirt 0.2.0 through 0.8.2 creates iptables rules with improper mappings of privileged source ports, which allows guest OS users to bypass intended access restrictions by leveraging IP address and source-port values, as demonstrated by copying and deleting an NFS directory tree. | 2.1 |
2010-08-19 | CVE-2010-2239 | Permissions, Privileges, and Access Controls vulnerability in Libvirt Red Hat libvirt, possibly 0.6.0 through 0.8.2, creates new images without setting the user-defined backing-store format, which allows guest OS users to read arbitrary files on the host OS via unspecified vectors. | 4.4 |
2010-08-19 | CVE-2010-2238 | Permissions, Privileges, and Access Controls vulnerability in Libvirt Red Hat libvirt, possibly 0.7.2 through 0.8.2, recurses into disk-image backing stores without extracting the defined disk backing-store format, which might allow guest OS users to read arbitrary files on the host OS, and possibly have unspecified other impact, via unknown vectors. | 4.4 |
2010-08-19 | CVE-2010-2237 | Permissions, Privileges, and Access Controls vulnerability in Libvirt Red Hat libvirt, possibly 0.6.1 through 0.8.2, looks up disk backing stores without referring to the user-defined main disk format, which might allow guest OS users to read arbitrary files on the host OS, and possibly have unspecified other impact, via unknown vectors. | 4.4 |
2008-12-19 | CVE-2008-5086 | Local Security Bypass vulnerability in libvirt Multiple methods in libvirt 0.3.2 through 0.5.1 do not check if a connection is read-only, which allows local users to bypass intended access restrictions and perform administrative actions. | 7.2 |