qemu-kvm vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the qemu-kvm package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Information Exposure

*
  • L
Reachable Assertion

*
  • M
Improper Synchronization

*
  • M
Out-of-bounds Read

*
  • M
Operation on a Resource after Expiration or Release

*
  • M
Double Free

*
  • M
Stack-based Buffer Overflow

*
  • M
Incorrect Synchronization

*
  • M
Race Condition

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • M
Integer Overflow or Wraparound

*
  • M
Race Condition

*
  • M
Missing Release of Resource after Effective Lifetime

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
NULL Pointer Dereference

*
  • L
Off-by-one Error

*
  • M
Use After Free

*
  • M
Use After Free

*
  • L
Improper Locking

*
  • M
Release of Invalid Pointer or Reference

*
  • L
Incomplete Blacklist

<10:1.5.3-175.el7
  • H
Heap-based Buffer Overflow

<10:1.5.3-160.el7_6.3
  • H
Out-of-bounds Write

<10:1.5.3-156.el7_5.5
  • H
Heap-based Buffer Overflow

<10:1.5.3-156.el7_5.5
  • H
Sensitive Information Uncleared Before Release

<10:1.5.3-156.el7_5.2
  • M
Out-of-bounds Read

<10:1.5.3-156.el7_5.1
  • L
Out-of-bounds Read

<10:1.5.3-156.el7
  • L
Out-of-bounds Read

<10:1.5.3-156.el7
  • L
Resource Exhaustion

<10:1.5.3-156.el7
  • M
Out-of-bounds Write

<10:1.5.3-141.el7_4.4
  • M
Integer Overflow or Wraparound

<10:1.5.3-141.el7_4.4
  • M
Uncaught Exception

<10:1.5.3-141.el7_4.1
  • M
Buffer Overflow

<10:1.5.3-141.el7
  • M
Information Exposure

<10:1.5.3-141.el7
  • M
Integer Overflow or Wraparound

<10:1.5.3-141.el7
  • H
Out-of-bounds Write

<10:1.5.3-126.el7_3.9
  • H
Out-of-bounds Read

<10:1.5.3-126.el7_3.9
  • H
NULL Pointer Dereference

<10:1.5.3-126.el7_3.10
  • H
Heap-based Buffer Overflow

<10:1.5.3-126.el7_3.6
  • H
Out-of-bounds Write

<10:1.5.3-126.el7_3.5
  • H
Out-of-bounds Write

<10:1.5.3-126.el7_3.5
  • L
Out-of-bounds Read

<10:1.5.3-126.el7_3.3
  • M
Out-of-bounds Read

<10:1.5.3-126.el7
  • M
Buffer Overflow

<10:1.5.3-105.el7_2.7
  • M
Resource Exhaustion

<10:1.5.3-105.el7_2.7
  • H
Out-of-Bounds

<10:1.5.3-105.el7_2.4
  • H
Out-of-bounds Read

<10:1.5.3-105.el7_2.3
  • H
Out-of-bounds Read

<10:1.5.3-175.el7_9.1
  • M
Allocation of Resources Without Limits or Throttling

<10:1.5.3-86.el7_1.8
  • M
Missing Initialization of a Variable

<10:1.5.3-86.el7_1.6
  • H
Out-of-Bounds

<10:1.5.3-86.el7_1.5
  • H
Out-of-Bounds

<10:1.5.3-86.el7_1.5
  • L
Memory Leak

<10:1.5.3-175.el7
  • H
Out-of-Bounds

<10:1.5.3-86.el7_1.2
  • H
Improper Input Validation

<10:1.5.3-86.el7
  • L
Information Exposure

<10:1.5.3-60.el7_0.10
  • M
Out-of-bounds Write

<10:1.5.3-60.el7_0.5
  • M
Integer Overflow or Wraparound

<10:1.5.3-60.el7_0.5
  • M
Out-of-Bounds

<10:1.5.3-60.el7_0.5
  • M
Out-of-bounds Write

<10:1.5.3-60.el7_0.5
  • M
Out-of-bounds Write

<10:1.5.3-60.el7_0.5
  • M
Out-of-Bounds

<10:1.5.3-60.el7_0.5
  • M
Out-of-Bounds

<10:1.5.3-60.el7_0.5
  • M
Incorrect Conversion between Numeric Types

<10:1.5.3-60.el7_0.5
  • M
Integer Overflow or Wraparound

<10:1.5.3-60.el7_0.5
  • M
Integer Overflow or Wraparound

<10:1.5.3-60.el7_0.5
  • M
Out-of-Bounds

<10:1.5.3-60.el7_0.5
  • M
Improper Input Validation

<10:1.5.3-60.el7_0.5
  • M
Out-of-Bounds

<10:1.5.3-60.el7_0.5
  • M
Out-of-Bounds

<10:1.5.3-60.el7_0.5
  • M
Out-of-Bounds

<10:1.5.3-60.el7_0.5
  • H
Heap-based Buffer Overflow

<10:1.5.3-173.el7_8.1
  • H
Heap-based Buffer Overflow

<10:1.5.3-173.el7
  • M
Out-of-Bounds

<10:1.5.3-60.el7_0.2
  • M
Use After Free

*
  • M
Out-of-bounds Read

<10:1.5.3-175.el7_9.4
  • H
Sensitive Information Uncleared Before Release

<10:1.5.3-141.el7_4.6
  • H
Sensitive Information Uncleared Before Release

<10:1.5.3-167.el7_7.4
  • H
Use After Free

<10:1.5.3-175.el7_9.1
  • M
Reachable Assertion

<10:1.5.3-175.el7_9.3
  • M
Out-of-bounds Write

<10:1.5.3-175.el7_9.3
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Reachable Assertion

*
  • L
Incorrect Calculation of Buffer Size

*
  • H
Heap-based Buffer Overflow

<10:1.5.3-167.el7_7.4
  • M
Stack-based Buffer Overflow

*
  • L
Information Exposure

<10:1.5.3-167.el7
  • L
NULL Pointer Dereference

<10:1.5.3-167.el7_7.1
  • M
Stack-based Buffer Overflow

*
  • M
Integer Overflow or Wraparound

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Integer Overflow or Wraparound

*
  • H
Sensitive Information Uncleared Before Release

<10:1.5.3-160.el7_6.2
  • H
Information Exposure

<10:1.5.3-160.el7_6.2
  • H
Sensitive Information Uncleared Before Release

<10:1.5.3-160.el7_6.2
  • H
Sensitive Information Uncleared Before Release

<10:1.5.3-160.el7_6.2
  • L
Allocation of Resources Without Limits or Throttling

<10:1.5.3-156.el7
  • L
Use After Free

<10:1.5.3-156.el7
  • L
Out-of-Bounds

*
  • L
Access of Uninitialized Pointer

*
  • L
Access of Uninitialized Pointer

*
  • L
Access of Uninitialized Pointer

*
  • L
Reachable Assertion

*
  • L
Allocation of Resources Without Limits or Throttling

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Out-of-bounds Read

*
  • L
Stack-based Buffer Overflow

*
  • L
Divide By Zero

*
  • L
Improper Clearing of Heap Memory Before Release ('Heap Inspection')

*
  • L
Improper Clearing of Heap Memory Before Release ('Heap Inspection')

*
  • L
Divide By Zero

*
  • L
Use After Free

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Information Exposure

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
Integer Overflow or Wraparound

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Divide By Zero

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Out-of-bounds Write

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Directory Traversal

*
  • L
Information Exposure

*
  • M
Heap-based Buffer Overflow

*
  • L
NULL Pointer Dereference

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
NULL Pointer Dereference

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Out-of-bounds Read

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Buffer Overflow

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<10:1.5.3-126.el7
  • M
Buffer Overflow

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Integer Overflow or Wraparound

*
  • L
Insufficient Entropy

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Reachable Assertion

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • H
Use After Free

*
  • L
Use After Free

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
NULL Pointer Dereference

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Divide By Zero

*
  • L
Stack-based Buffer Overflow

*
  • L
Memory Leak

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Memory Leak

*
  • M
Missing Release of Resource after Effective Lifetime

*
  • L
NULL Pointer Dereference

*
  • L
Divide By Zero

*
  • L
Heap-based Buffer Overflow

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • H
Improper Input Validation

<10:1.5.3-86.el7
  • H
Improper Input Validation

<10:1.5.3-86.el7
  • H
NULL Pointer Dereference

<10:1.5.3-86.el7
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Insecure Temporary File

*
  • L
Improper Access Control

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Resource Exhaustion

*