qemu-kvm-common vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the qemu-kvm-common package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Improper Certificate Validation

<15:6.2.0-53.module+el8.10.0+22268+f82ccd96
  • L
Information Exposure

*
  • L
Reachable Assertion

*
  • M
Improper Synchronization

<15:6.2.0-53.module+el8.10.0+22268+f82ccd96
  • L
Race Condition

<15:6.2.0-49.module+el8.10.0+21533+3df3c4b6
  • M
Out-of-bounds Read

*
  • H
Improper Input Validation

<15:6.2.0-50.module+el8.10.0+22027+db0a70a4
  • M
Uncontrolled Memory Allocation

<15:6.2.0-49.module+el8.10.0+21533+3df3c4b6
  • M
Operation on a Resource after Expiration or Release

*
  • M
Double Free

<15:6.2.0-53.module+el8.10.0+22268+f82ccd96
  • M
NULL Pointer Dereference

<15:6.2.0-49.module+el8.10.0+21533+3df3c4b6
  • M
Stack-based Buffer Overflow

<15:6.2.0-49.module+el8.10.0+21533+3df3c4b6
  • M
Incorrect Synchronization

<15:6.2.0-49.module+el8.10.0+21533+3df3c4b6
  • H
Out-of-Bounds

<15:6.2.0-33.module+el8.8.0+19768+98f68f21
  • M
Race Condition

<15:6.2.0-40.module+el8.9.0+20056+d9fb1ac3.1
  • M
Use After Free

<15:6.2.0-40.module+el8.9.0+20867+9a6a0901.2
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<15:6.2.0-49.module+el8.10.0+21533+3df3c4b6
  • H
NULL Pointer Dereference

<15:6.2.0-33.module+el8.8.0+19768+98f68f21
  • M
Memory Leak

<15:6.2.0-32.module+el8.8.0+18361+9f407f6e
  • M
Out-of-bounds Read

<15:6.2.0-32.module+el8.8.0+18361+9f407f6e
  • M
Out-of-bounds Read

<15:6.2.0-21.module+el8.7.0+17573+effbd7e8.2
  • M
Integer Underflow

<15:6.2.0-32.module+el8.8.0+18361+9f407f6e
  • L
Out-of-Bounds

<15:6.2.0-20.module+el8.7.0+16689+53d59bc2.1
  • M
Heap-based Buffer Overflow

<15:6.2.0-32.module+el8.8.0+18361+9f407f6e
  • M
Heap-based Buffer Overflow

<15:6.2.0-32.module+el8.8.0+18361+9f407f6e
  • M
Heap-based Buffer Overflow

<15:6.2.0-32.module+el8.8.0+18361+9f407f6e
  • M
Buffer Overflow

<15:6.2.0-32.module+el8.8.0+18361+9f407f6e
  • M
Heap-based Buffer Overflow

<15:6.2.0-32.module+el8.8.0+18361+9f407f6e
  • M
Integer Overflow or Wraparound

<15:6.2.0-11.module+el8.6.0+15668+464a1f31.2
  • M
Race Condition

<15:6.2.0-11.module+el8.6.0+15668+464a1f31.2
  • L
Improper Locking

<15:6.2.0-20.module+el8.7.0+16689+53d59bc2.1
  • M
Missing Release of Resource after Effective Lifetime

<15:6.2.0-11.module+el8.6.0+15668+464a1f31.2
  • M
Missing Release of Resource after Effective Lifetime

<15:6.2.0-11.module+el8.6.0+15668+464a1f31.2
  • L
Out-of-bounds Read

<15:6.2.0-20.module+el8.7.0+16689+53d59bc2.1
  • M
Unchecked Return Value

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Improper Check for Dropped Privileges

<15:4.2.0-59.module+el8.5.0+14169+68d2f392.2
  • M
NULL Pointer Dereference

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
NULL Pointer Dereference

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Use After Free

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • L
Off-by-one Error

<15:4.2.0-59.module+el8.5.0+13495+8166cdf8.1
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Use After Free

<15:6.2.0-40.module+el8.9.0+20056+d9fb1ac3.1
  • M
Use After Free

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • L
Improper Locking

*
  • M
Improper Enforcement of Message Integrity During Transmission in a Communication Channel

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Release of Invalid Pointer or Reference

*
  • M
Resource Exhaustion

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Improper Locking

<15:4.2.0-59.module+el8.5.0+12817+cb650d43
  • M
Double Free

<15:4.2.0-48.module+el8.4.0+10368+630e803b
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<15:4.2.0-48.module+el8.4.0+10368+630e803b
  • M
Out-of-bounds Read

<15:4.2.0-34.module+el8.3.0+10437+1ca0c2ba.5
  • H
Improper Privilege Management

<15:4.2.0-34.module+el8.3.0+9903+ca3e42fb.4
  • M
Missing Release of Resource after Effective Lifetime

<15:4.2.0-34.module+el8.3.0+7976+077be4ec
  • M
Improper Cross-boundary Removal of Sensitive Data

<15:4.2.0-34.module+el8.3.0+7976+077be4ec
  • M
NULL Pointer Dereference

<15:4.2.0-34.module+el8.3.0+7976+077be4ec
  • H
Out-of-bounds Read

<15:2.12.0-99.module+el8.2.0+7988+c1d02dbb.4
  • H
Memory Leak

<15:2.12.0-99.module+el8.2.0+6870+55b789b4.2
  • H
Heap-based Buffer Overflow

<15:2.12.0-99.module+el8.2.0+6870+55b789b4.2
  • H
Heap-based Buffer Overflow

<15:2.12.0-88.module+el8.1.0+5708+85d8e057.3
  • H
Heap-based Buffer Overflow

<15:2.12.0-88.module+el8.1.0+5708+85d8e057.3
  • M
Use After Free

<15:4.2.0-34.module+el8.3.0+7976+077be4ec
  • M
Out-of-bounds Read

<15:4.2.0-48.module+el8.4.0+10368+630e803b
  • M
Sensitive Information Uncleared Before Release

<15:2.12.0-88.module+el8.1.0+5149+3ff2765e.2
  • M
Use After Free

<15:4.2.0-34.module+el8.3.0+7976+077be4ec
  • M
Reachable Assertion

<15:4.2.0-48.module+el8.4.0+10368+630e803b
  • M
Out-of-bounds Write

<15:4.2.0-48.module+el8.4.0+10368+630e803b
  • M
Out-of-bounds Read

<15:4.2.0-48.module+el8.4.0+10368+630e803b
  • M
Out-of-bounds Read

<15:4.2.0-48.module+el8.4.0+10368+630e803b
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<15:4.2.0-48.module+el8.4.0+10368+630e803b
  • M
Reachable Assertion

<15:4.2.0-48.module+el8.4.0+10368+630e803b
  • M
Resource Exhaustion

<15:4.2.0-34.module+el8.3.0+7976+077be4ec
  • H
Out-of-bounds Read

<15:2.12.0-99.module+el8.2.0+7988+c1d02dbb.4
  • M
Incorrect Calculation of Buffer Size

<15:4.2.0-48.module+el8.4.0+10368+630e803b
  • H
Heap-based Buffer Overflow

<15:2.12.0-65.module+el8.0.0+4084+cceb9f44.5
  • L
Heap-based Buffer Overflow

<15:2.12.0-88.module+el8.1.0+4233+bc44be3f
  • L
Information Exposure

<15:2.12.0-88.module+el8.1.0+4233+bc44be3f
  • L
NULL Pointer Dereference

<15:2.12.0-88.module+el8.1.0+4233+bc44be3f
  • H
Improper Access Control

<15:2.12.0-64.module+el8.0.0.z+3418+a72cf898.2
  • H
Improper Access Control

<15:2.12.0-64.module+el8.0.0.z+3418+a72cf898.2
  • H
Improper Access Control

<15:2.12.0-64.module+el8.0.0.z+3418+a72cf898.2
  • H
Improper Access Control

<15:2.12.0-64.module+el8.0.0.z+3418+a72cf898.2
  • H
Incorrect Permission Assignment for Critical Resource

<15:2.12.0-64.module+el8.0.0+3180+d6a3561d.2
  • H
Heap-based Buffer Overflow

<15:2.12.0-64.module+el8.0.0+3180+d6a3561d.2
  • H
Integer Overflow or Wraparound

<15:2.12.0-64.module+el8.0.0+3180+d6a3561d.2
  • H
Integer Overflow or Wraparound

<15:2.12.0-64.module+el8.0.0+3180+d6a3561d.2
  • H
Integer Overflow or Wraparound

<15:2.12.0-64.module+el8.0.0+3180+d6a3561d.2
  • H
Integer Overflow or Wraparound

<15:2.12.0-64.module+el8.0.0+3180+d6a3561d.2
  • H
Sensitive Information Uncleared Before Release

<15:2.12.0-64.module+el8.0.0+3180+d6a3561d.2
  • H
Information Exposure

<15:2.12.0-64.module+el8.0.0+3180+d6a3561d.2
  • H
Sensitive Information Uncleared Before Release

<15:2.12.0-64.module+el8.0.0+3180+d6a3561d.2
  • H
Sensitive Information Uncleared Before Release

<15:2.12.0-64.module+el8.0.0+3180+d6a3561d.2
  • M
Incorrect Permission Assignment for Critical Resource

<15:4.2.0-59.module+el8.5.0+12817+cb650d43
  • L
Out-of-Bounds

<15:6.2.0-20.module+el8.7.0+16689+53d59bc2.1
  • M
Access of Uninitialized Pointer

<15:4.2.0-59.module+el8.5.0+12817+cb650d43
  • M
Access of Uninitialized Pointer

<15:4.2.0-59.module+el8.5.0+12817+cb650d43
  • M
Access of Uninitialized Pointer

<15:4.2.0-59.module+el8.5.0+12817+cb650d43
  • M
Access of Uninitialized Pointer

<15:4.2.0-59.module+el8.5.0+12817+cb650d43
  • M
Out-of-bounds Read

<15:4.2.0-48.module+el8.4.0+11909+3300d70f.3
  • L
Allocation of Resources Without Limits or Throttling

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<15:4.2.0-48.module+el8.4.0+11909+3300d70f.3
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<15:4.2.0-59.module+el8.5.0+13495+8166cdf8.1
  • M
Out-of-bounds Read

<15:4.2.0-48.module+el8.4.0+11909+3300d70f.3
  • M
NULL Pointer Dereference

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Reachable Assertion

<15:4.2.0-48.module+el8.4.0+11909+3300d70f.3
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

<15:4.2.0-59.module+el8.5.0+12817+cb650d43
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
NULL Pointer Dereference

*
  • M
Out-of-bounds Read

<15:4.2.0-48.module+el8.4.0+11909+3300d70f.3
  • L
Allocation of Resources Without Limits or Throttling

*
  • M
Reachable Assertion

*
  • L
Information Exposure

*
  • L
Improper Access Control

*
  • L
NULL Pointer Dereference

*