qemu vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the qemu package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
NULL Pointer Dereference

<6.1.0-r0
  • M
Use After Free

<6.0.0-r2
  • M
NULL Pointer Dereference

<6.0.0-r2
  • M
Out-of-bounds Write

<5.1.0-r1
  • M
Out-of-bounds Read

<5.2.0-r0
  • H
Improper Privilege Management

<5.2.0-r0
  • M
Out-of-bounds Write

<5.1.0-r1
  • M
Integer Underflow

<7.1.0-r4
  • M
Out-of-bounds Read

<5.1.0-r1
  • M
Out-of-bounds Write

<4.2.0-r0
  • M
Integer Overflow or Wraparound

<2.8.1-r1
  • L
NULL Pointer Dereference

<5.2.0-r0
  • L
Reachable Assertion

<5.1.0-r1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.8.1-r1
  • M
Out-of-bounds Write

<5.1.0-r1
  • M
Memory Leak

<2.8.1-r1
  • L
Integer Overflow or Wraparound

<5.2.0-r0
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<6.0.0-r1
  • M
Missing Release of Resource after Effective Lifetime

<2.8.1-r1
  • M
Out-of-Bounds

<6.0.0-r1
  • M
Allocation of Resources Without Limits or Throttling

<6.0.0-r2
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.8.1-r1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<5.1.0-r1
  • L
Out-of-bounds Write

<5.1.0-r1
  • M
Memory Leak

<2.8.1-r1
  • M
Buffer Overflow

<2.8.1-r1
  • M
Out-of-Bounds

<5.0.0-r0
  • M
Incorrect Calculation

<5.0.0-r0
  • M
Memory Leak

<2.8.1-r1
  • M
Memory Leak

<2.8.1-r1
  • M
Information Exposure

<2.8.1-r1
  • M
Integer Overflow or Wraparound

<2.8.1-r1
  • M
Missing Release of Resource after Effective Lifetime

<2.8.1-r1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<5.1.0-r1
  • M
Missing Release of Resource after Effective Lifetime

<2.8.1-r1
  • L
Out-of-bounds Read

<5.1.0-r1
  • M
Out-of-bounds Read

<5.0.0-r0
  • M
Out-of-bounds Read

<5.1.0-r1
  • M
Reachable Assertion

<5.0.0-r0
  • L
NULL Pointer Dereference

<5.0.0-r0
  • M
Missing Release of Resource after Effective Lifetime

<2.8.1-r1
  • H
Integer Overflow or Wraparound

<2.8.1-r1
  • C
Out-of-bounds Read

<2.8.1-r1
  • M
Out-of-bounds Write

<8.0.0-r6
  • M
Out-of-bounds Write

<5.2.0-r0
  • L
NULL Pointer Dereference

<5.2.0-r0
  • H
CVE-2023-2861

<8.0.2-r1
  • C
Out-of-bounds Read

<2.8.1-r1
  • L
NULL Pointer Dereference

<5.0.0-r0
  • L
Use After Free

<5.0.0-r0
  • H
Improper Synchronization

<7.1.0-r4
  • M
NULL Pointer Dereference

<7.0.0-r0
  • M
Missing Release of Resource after Effective Lifetime

<2.8.1-r1
  • M
Memory Leak

<2.8.1-r1
  • H
Race Condition

<6.0.0-r1
  • L
Use After Free

<6.0.0-r1
  • M
Allocation of Resources Without Limits or Throttling

<2.8.1-r1
  • H
Release of Invalid Pointer or Reference

<6.1.0-r0
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<6.0.0-r1
  • M
Out-of-bounds Read

<5.0.0-r0
  • M
NULL Pointer Dereference

<6.0.0-r2
  • L
Reachable Assertion

<5.2.0-r0
  • M
Memory Leak

<2.8.1-r1
  • M
CVE-2016-8578

<2.8.1-r1
  • M
Memory Leak

<6.1.0-r0
  • M
Use of Uninitialized Resource

<6.1.0-r0
  • M
Out-of-Bounds

<6.1.0-r0
  • H
Out-of-bounds Write

<6.1.0-r0
  • M
Divide By Zero

<5.2.0-r0
  • L
Out-of-bounds Read

<5.2.0-r0
  • L
Use After Free

<5.1.0-r1
  • L
Divide By Zero

<5.0.0-r0
  • L
NULL Pointer Dereference

<5.1.0-r1
  • M
Uncontrolled Recursion

<5.0.0-r0
  • M
Out-of-bounds Read

<2.8.1-r1
  • M
Missing Release of Resource after Effective Lifetime

<2.8.1-r1
  • M
Missing Release of Resource after Effective Lifetime

<2.8.1-r1