Search for packages
| purl | pkg:deb/debian/libguestfs@1:1.44.0-2?distro=trixie |
| Next non-vulnerable version | 1:1.46.2-1 |
| Latest non-vulnerable version | 1:1.58.1-5 |
| Risk | 2.5 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-u1k9-bumt-1fde
Aliases: CVE-2022-2211 |
libguestfs: Buffer overflow in get_keys leads to DoS |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1qz4-kn1f-ufdu | libguestfs: virt-edit creates a new file, when it is used leading to loss of file attributes (permissions, owner, SELinux context etc.) |
CVE-2012-2690
|
| VCID-3qpn-v9pw-vbgs | kernel: possible privilege escalation via SG_IO ioctl |
CVE-2011-4127
|
| VCID-dev1-tzya-2ubw | libguestfs: DoS (abort) due to a double free flaw when inspecting certain guest files / images |
CVE-2013-2124
|
| VCID-qpjc-y731-c7f5 | libguestfs: insecure temporary directory handling for guestfish's network socket |
CVE-2013-4419
|