qemu-img vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the qemu-img package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
Out-of-bounds Read

*
  • H
Double Free

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

<15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4
  • M
Improper Certificate Validation

<15:6.2.0-53.module+el8.10.0+22268+f82ccd96
  • L
Information Exposure

*
  • L
Reachable Assertion

*
  • M
Improper Synchronization

<15:6.2.0-53.module+el8.10.0+22268+f82ccd96
  • L
Return of Stack Variable Address

<15:6.2.0-49.module+el8.10.0+21533+3df3c4b6
  • M
Out-of-bounds Read

*
  • H
Out-of-bounds Write

<15:6.2.0-50.module+el8.10.0+22027+db0a70a4
  • M
Uncontrolled Memory Allocation

<15:6.2.0-49.module+el8.10.0+21533+3df3c4b6
  • M
Double Free

<15:6.2.0-53.module+el8.10.0+22268+f82ccd96
  • M
NULL Pointer Dereference

<15:6.2.0-49.module+el8.10.0+21533+3df3c4b6
  • M
Stack-based Buffer Overflow

<15:6.2.0-49.module+el8.10.0+21533+3df3c4b6
  • M
Incorrect Synchronization

<15:6.2.0-49.module+el8.10.0+21533+3df3c4b6
  • H
Out-of-Bounds

<15:6.2.0-33.module+el8.8.0+19768+98f68f21
  • M
Race Condition

<15:6.2.0-40.module+el8.9.0+20056+d9fb1ac3.1
  • M
Use After Free

<15:6.2.0-40.module+el8.9.0+20867+9a6a0901.2
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<15:6.2.0-49.module+el8.10.0+21533+3df3c4b6
  • H
NULL Pointer Dereference

<15:6.2.0-33.module+el8.8.0+19768+98f68f21
  • M
Memory Leak

<15:6.2.0-32.module+el8.8.0+18361+9f407f6e
  • M
Out-of-bounds Read

<15:6.2.0-32.module+el8.8.0+18361+9f407f6e
  • M
Out-of-bounds Read

<15:6.2.0-21.module+el8.7.0+17573+effbd7e8.2
  • M
Integer Underflow

<15:6.2.0-32.module+el8.8.0+18361+9f407f6e
  • L
Out-of-Bounds

<15:6.2.0-20.module+el8.7.0+16689+53d59bc2.1
  • M
Heap-based Buffer Overflow

<15:6.2.0-32.module+el8.8.0+18361+9f407f6e
  • M
Heap-based Buffer Overflow

<15:6.2.0-32.module+el8.8.0+18361+9f407f6e
  • M
Heap-based Buffer Overflow

<15:6.2.0-32.module+el8.8.0+18361+9f407f6e
  • M
Buffer Overflow

<15:6.2.0-32.module+el8.8.0+18361+9f407f6e
  • M
Heap-based Buffer Overflow

<15:6.2.0-32.module+el8.8.0+18361+9f407f6e
  • M
Integer Overflow or Wraparound

<15:6.2.0-11.module+el8.6.0+15668+464a1f31.2
  • M
Race Condition

<15:6.2.0-11.module+el8.6.0+15668+464a1f31.2
  • L
Improper Locking

<15:6.2.0-20.module+el8.7.0+16689+53d59bc2.1
  • M
Missing Release of Resource after Effective Lifetime

<15:6.2.0-11.module+el8.6.0+15668+464a1f31.2
  • M
Missing Release of Resource after Effective Lifetime

<15:6.2.0-11.module+el8.6.0+15668+464a1f31.2
  • L
Out-of-bounds Read

<15:6.2.0-20.module+el8.7.0+16689+53d59bc2.1
  • M
Unchecked Return Value

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Improper Check for Dropped Privileges

<15:4.2.0-59.module+el8.5.0+14169+68d2f392.2
  • M
NULL Pointer Dereference

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
NULL Pointer Dereference

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Use After Free

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • L
Off-by-one Error

<15:4.2.0-59.module+el8.5.0+13495+8166cdf8.1
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Use After Free

<15:6.2.0-40.module+el8.9.0+20056+d9fb1ac3.1
  • M
Use After Free

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • L
Improper Locking

*
  • M
Improper Enforcement of Message Integrity During Transmission in a Communication Channel

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Release of Invalid Pointer or Reference

*
  • M
Resource Exhaustion

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Improper Locking

<15:4.2.0-59.module+el8.5.0+12817+cb650d43
  • M
Double Free

<15:4.2.0-48.module+el8.4.0+10368+630e803b
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<15:4.2.0-48.module+el8.4.0+10368+630e803b
  • M
Out-of-bounds Read

<15:4.2.0-34.module+el8.3.0+10437+1ca0c2ba.5
  • H
Improper Privilege Management

<15:4.2.0-34.module+el8.3.0+9903+ca3e42fb.4
  • M
Missing Release of Resource after Effective Lifetime

<15:4.2.0-34.module+el8.3.0+7976+077be4ec
  • M
Improper Cross-boundary Removal of Sensitive Data

<15:4.2.0-34.module+el8.3.0+7976+077be4ec
  • M
NULL Pointer Dereference

<15:4.2.0-34.module+el8.3.0+7976+077be4ec
  • H
Out-of-bounds Read

<15:2.12.0-99.module+el8.2.0+7988+c1d02dbb.4
  • H
Memory Leak

<15:2.12.0-99.module+el8.2.0+6870+55b789b4.2
  • H
Heap-based Buffer Overflow

<15:2.12.0-99.module+el8.2.0+6870+55b789b4.2
  • H
Heap-based Buffer Overflow

<15:2.12.0-88.module+el8.1.0+5708+85d8e057.3
  • H
Heap-based Buffer Overflow

<15:2.12.0-88.module+el8.1.0+5708+85d8e057.3
  • M
Use After Free

<15:4.2.0-34.module+el8.3.0+7976+077be4ec
  • M
Out-of-bounds Read

<15:4.2.0-48.module+el8.4.0+10368+630e803b
  • M
Covert Timing Channel

<15:2.12.0-88.module+el8.1.0+5149+3ff2765e.2
  • M
Use After Free

<15:4.2.0-34.module+el8.3.0+7976+077be4ec
  • M
Reachable Assertion

<15:4.2.0-48.module+el8.4.0+10368+630e803b
  • M
Out-of-bounds Write

<15:4.2.0-48.module+el8.4.0+10368+630e803b
  • M
Out-of-bounds Read

<15:4.2.0-48.module+el8.4.0+10368+630e803b
  • M
Out-of-bounds Read

<15:4.2.0-48.module+el8.4.0+10368+630e803b
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<15:4.2.0-48.module+el8.4.0+10368+630e803b
  • M
Reachable Assertion

<15:4.2.0-48.module+el8.4.0+10368+630e803b
  • M
Resource Exhaustion

<15:4.2.0-34.module+el8.3.0+7976+077be4ec
  • H
Out-of-bounds Read

<15:2.12.0-99.module+el8.2.0+7988+c1d02dbb.4
  • M
Incorrect Calculation of Buffer Size

<15:4.2.0-48.module+el8.4.0+10368+630e803b
  • H
Heap-based Buffer Overflow

<15:2.12.0-65.module+el8.0.0+4084+cceb9f44.5
  • L
Heap-based Buffer Overflow

<15:2.12.0-88.module+el8.1.0+4233+bc44be3f
  • L
Information Exposure

<15:2.12.0-88.module+el8.1.0+4233+bc44be3f
  • L
NULL Pointer Dereference

<15:2.12.0-88.module+el8.1.0+4233+bc44be3f
  • H
Inclusion of Functionality from Untrusted Control Sphere

<15:2.12.0-64.module+el8.0.0.z+3418+a72cf898.2
  • H
Improper Access Control

<15:2.12.0-64.module+el8.0.0.z+3418+a72cf898.2
  • H
Improper Access Control

<15:2.12.0-64.module+el8.0.0.z+3418+a72cf898.2
  • H
Inclusion of Functionality from Untrusted Control Sphere

<15:2.12.0-64.module+el8.0.0.z+3418+a72cf898.2
  • H
Incorrect Permission Assignment for Critical Resource

<15:2.12.0-64.module+el8.0.0+3180+d6a3561d.2
  • H
Heap-based Buffer Overflow

<15:2.12.0-64.module+el8.0.0+3180+d6a3561d.2
  • H
Integer Overflow or Wraparound

<15:2.12.0-64.module+el8.0.0+3180+d6a3561d.2
  • H
Integer Overflow or Wraparound

<15:2.12.0-64.module+el8.0.0+3180+d6a3561d.2
  • H
Integer Overflow or Wraparound

<15:2.12.0-64.module+el8.0.0+3180+d6a3561d.2
  • H
Integer Overflow or Wraparound

<15:2.12.0-64.module+el8.0.0+3180+d6a3561d.2
  • H
Covert Storage Channel

<15:2.12.0-64.module+el8.0.0+3180+d6a3561d.2
  • H
Information Exposure

<15:2.12.0-64.module+el8.0.0+3180+d6a3561d.2
  • H
Covert Timing Channel

<15:2.12.0-64.module+el8.0.0+3180+d6a3561d.2
  • H
Covert Storage Channel

<15:2.12.0-64.module+el8.0.0+3180+d6a3561d.2
  • M
Incorrect Permission Assignment for Critical Resource

<15:4.2.0-59.module+el8.5.0+12817+cb650d43
  • L
Out-of-Bounds

<15:6.2.0-20.module+el8.7.0+16689+53d59bc2.1
  • M
Access of Uninitialized Pointer

<15:4.2.0-59.module+el8.5.0+12817+cb650d43
  • M
Access of Uninitialized Pointer

<15:4.2.0-59.module+el8.5.0+12817+cb650d43
  • M
Access of Uninitialized Pointer

<15:4.2.0-59.module+el8.5.0+12817+cb650d43
  • M
Access of Uninitialized Pointer

<15:4.2.0-59.module+el8.5.0+12817+cb650d43
  • M
Out-of-bounds Read

<15:4.2.0-48.module+el8.4.0+11909+3300d70f.3
  • L
Allocation of Resources Without Limits or Throttling

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<15:4.2.0-48.module+el8.4.0+11909+3300d70f.3
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<15:4.2.0-59.module+el8.5.0+13495+8166cdf8.1
  • M
Out-of-bounds Read

<15:4.2.0-48.module+el8.4.0+11909+3300d70f.3
  • M
NULL Pointer Dereference

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Reachable Assertion

<15:4.2.0-48.module+el8.4.0+11909+3300d70f.3
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

<15:4.2.0-59.module+el8.5.0+12817+cb650d43
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
NULL Pointer Dereference

*
  • M
Out-of-bounds Read

<15:4.2.0-48.module+el8.4.0+11909+3300d70f.3
  • L
Allocation of Resources Without Limits or Throttling

*
  • M
Reachable Assertion

*
  • L
Information Exposure

*
  • L
Improper Access Control

*
  • L
NULL Pointer Dereference

*