qemu vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the qemu package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Improper Synchronization

<7.1.0-r4
  • M
Integer Underflow

<7.1.0-r4
  • M
NULL Pointer Dereference

<7.0.0-r0
  • H
Out-of-bounds Write

<6.1.0-r0
  • M
NULL Pointer Dereference

<6.1.0-r0
  • M
Reachable Assertion

<5.0.0-r0
  • M
Incorrect Calculation

<5.0.0-r0
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<5.1.0-r1
  • L
NULL Pointer Dereference

<5.1.0-r1
  • H
Race Condition

<6.0.0-r1
  • L
NULL Pointer Dereference

<5.2.0-r0
  • L
Out-of-bounds Write

<5.1.0-r1
  • M
Out-of-bounds Read

<5.1.0-r1
  • L
Out-of-bounds Read

<5.1.0-r1
  • M
Uncontrolled Recursion

<5.0.0-r0
  • M
Out-of-bounds Write

<5.1.0-r1
  • M
Out-of-bounds Read

<5.0.0-r0
  • L
Reachable Assertion

<5.2.0-r0
  • M
Out-of-bounds Write

<5.1.0-r1
  • M
NULL Pointer Dereference

<6.0.0-r2
  • H
Release of Invalid Pointer or Reference

<6.1.0-r0
  • M
Memory Leak

<6.1.0-r0
  • M
Out-of-Bounds

<6.1.0-r0
  • L
NULL Pointer Dereference

<5.0.0-r0
  • L
Use After Free

<6.0.0-r1
  • L
Use After Free

<5.0.0-r0
  • M
Out-of-bounds Read

<5.2.0-r0
  • M
Out-of-bounds Write

<5.1.0-r1
  • L
Divide By Zero

<5.0.0-r0
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<5.1.0-r1
  • M
Out-of-bounds Write

<4.2.0-r0
  • L
Reachable Assertion

<5.1.0-r1
  • M
Use of Uninitialized Resource

<6.1.0-r0
  • M
Use After Free

<6.0.0-r2
  • M
NULL Pointer Dereference

<6.0.0-r2
  • M
Out-of-bounds Write

<5.2.0-r0
  • M
Divide By Zero

<5.2.0-r0
  • L
NULL Pointer Dereference

<5.2.0-r0
  • M
Out-of-Bounds

<6.0.0-r1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<6.0.0-r1
  • L
Use After Free

<5.1.0-r1
  • L
Out-of-bounds Read

<5.2.0-r0
  • L
NULL Pointer Dereference

<5.0.0-r0
  • M
Out-of-bounds Read

<5.0.0-r0
  • M
Out-of-Bounds

<5.0.0-r0
  • H
Improper Privilege Management

<5.2.0-r0
  • L
Integer Overflow or Wraparound

<5.2.0-r0
  • M
Allocation of Resources Without Limits or Throttling

<6.0.0-r2
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<6.0.0-r1
  • M
Out-of-bounds Read

<5.1.0-r1
  • C
Out-of-bounds Read

<2.8.1-r1
  • C
Out-of-bounds Read

<2.8.1-r1
  • H
Integer Overflow or Wraparound

<2.8.1-r1
  • M
Memory Leak

<2.8.1-r1
  • M
Memory Leak

<2.8.1-r1
  • M
Out-of-bounds Read

<2.8.1-r1
  • M
Integer Overflow or Wraparound

<2.8.1-r1
  • M
Memory Leak

<2.8.1-r1
  • M
Memory Leak

<2.8.1-r1
  • M
Memory Leak

<2.8.1-r1
  • M
Memory Leak

<2.8.1-r1
  • M
Missing Release of Resource after Effective Lifetime

<2.8.1-r1
  • M
Missing Release of Resource after Effective Lifetime

<2.8.1-r1
  • M
Missing Release of Resource after Effective Lifetime

<2.8.1-r1
  • M
Integer Overflow or Wraparound

<2.8.1-r1
  • M
Missing Release of Resource after Effective Lifetime

<2.8.1-r1
  • M
Missing Release of Resource after Effective Lifetime

<2.8.1-r1
  • M
Missing Release of Resource after Effective Lifetime

<2.8.1-r1
  • M
Information Exposure

<2.8.1-r1
  • M
Allocation of Resources Without Limits or Throttling

<2.8.1-r1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.8.1-r1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.8.1-r1
  • M
Missing Release of Resource after Effective Lifetime

<2.8.1-r1
  • M
CVE-2016-8578

<2.8.1-r1
  • M
Buffer Overflow

<2.8.1-r1