Libguestfs Libguestfs

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in any Libguestfs product.

RSS Feeds for Libguestfs security vulnerabilities

Create a CVE RSS feed including security vulnerabilities found in Libguestfs products with stack.watch. Just hit watch, then grab your custom RSS feed url.

Products by Libguestfs Sorted by Most Security Vulnerabilities since 2018

Libguestfs Hivex1 vulnerability

Libguestfs1 vulnerability

Libguestfs Libnbd1 vulnerability

By the Year

In 2026 there have been 0 vulnerabilities in Libguestfs. Libguestfs did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 0 0.00
2023 0 0.00
2022 1 6.50
2021 1 5.40
2020 0 0.00
2019 1 0.00

It may take a day or so for new Libguestfs vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Libguestfs Security Vulnerabilities

CVE Date Vulnerability Products
CVE-2022-2211 Jul 12, 2022
A vulnerability was found in libguestfs A vulnerability was found in libguestfs. This issue occurs while calculating the greatest possible number of matching keys in the get_keys() function. This flaw leads to a denial of service, either by mistake or malicious actor.
Libguestfs
CVE-2021-3504 May 11, 2021
A flaw was found in the hivex library in versions before 1.3.20 A flaw was found in the hivex library in versions before 1.3.20. It is caused due to a lack of bounds check within the hivex_open function. An attacker could input a specially crafted Windows Registry (hive) file which would cause hivex to read memory beyond its normal bounds or cause the program to crash. The highest threat from this vulnerability is to system availability.
Hivex
CVE-2019-14842 Nov 26, 2019
Structured reply is a feature of the newstyle NBD protocol allowing the server to send a reply in chunks Structured reply is a feature of the newstyle NBD protocol allowing the server to send a reply in chunks. A bounds check which was supposed to test for chunk offsets smaller than the beginning of the request did not work because of signed/unsigned confusion. If one of these chunks contains a negative offset then data under control of the server is written to memory before the read buffer supplied by the client. If the read buffer is located on the stack then this allows the stack return address from nbd_pread() to be trivially modified, allowing arbitrary code execution under the control of the server. If the buffer is located on the heap then other memory objects before the buffer can be overwritten, which again would usually lead to arbitrary code execution.
Libnbd
Built by Foundeo Inc., with data from the National Vulnerability Database (NVD). Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.