qemu-kvm-docs vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the qemu-kvm-docs package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Improper Certificate Validation

<15:6.2.0-53.module+el8.10.0+22268+f82ccd96
  • L
Information Exposure

*
  • L
Reachable Assertion

*
  • M
Improper Synchronization

<15:6.2.0-53.module+el8.10.0+22268+f82ccd96
  • L
Race Condition

<15:6.2.0-49.module+el8.10.0+21533+3df3c4b6
  • M
Out-of-bounds Read

*
  • H
Improper Input Validation

<15:6.2.0-50.module+el8.10.0+22027+db0a70a4
  • M
Uncontrolled Memory Allocation

<15:6.2.0-49.module+el8.10.0+21533+3df3c4b6
  • M
Operation on a Resource after Expiration or Release

*
  • M
Double Free

<15:6.2.0-53.module+el8.10.0+22268+f82ccd96
  • M
NULL Pointer Dereference

<15:6.2.0-49.module+el8.10.0+21533+3df3c4b6
  • M
Stack-based Buffer Overflow

<15:6.2.0-49.module+el8.10.0+21533+3df3c4b6
  • M
Incorrect Synchronization

<15:6.2.0-49.module+el8.10.0+21533+3df3c4b6
  • H
Out-of-Bounds

<15:6.2.0-33.module+el8.8.0+19768+98f68f21
  • M
Race Condition

<15:6.2.0-40.module+el8.9.0+20056+d9fb1ac3.1
  • M
Use After Free

<15:6.2.0-40.module+el8.9.0+20867+9a6a0901.2
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<15:6.2.0-49.module+el8.10.0+21533+3df3c4b6
  • H
NULL Pointer Dereference

<15:6.2.0-33.module+el8.8.0+19768+98f68f21
  • M
Memory Leak

<15:6.2.0-32.module+el8.8.0+18361+9f407f6e
  • M
Out-of-bounds Read

<15:6.2.0-32.module+el8.8.0+18361+9f407f6e
  • M
Out-of-bounds Read

<15:6.2.0-21.module+el8.7.0+17573+effbd7e8.2
  • M
Integer Underflow

<15:6.2.0-32.module+el8.8.0+18361+9f407f6e
  • L
Out-of-Bounds

<15:6.2.0-20.module+el8.7.0+16689+53d59bc2.1
  • M
Heap-based Buffer Overflow

<15:6.2.0-32.module+el8.8.0+18361+9f407f6e
  • M
Heap-based Buffer Overflow

<15:6.2.0-32.module+el8.8.0+18361+9f407f6e
  • M
Heap-based Buffer Overflow

<15:6.2.0-32.module+el8.8.0+18361+9f407f6e
  • M
Buffer Overflow

<15:6.2.0-32.module+el8.8.0+18361+9f407f6e
  • M
Heap-based Buffer Overflow

<15:6.2.0-32.module+el8.8.0+18361+9f407f6e
  • M
Integer Overflow or Wraparound

<15:6.2.0-11.module+el8.6.0+15668+464a1f31.2
  • M
Race Condition

<15:6.2.0-11.module+el8.6.0+15668+464a1f31.2
  • L
Improper Locking

<15:6.2.0-20.module+el8.7.0+16689+53d59bc2.1
  • M
Missing Release of Resource after Effective Lifetime

<15:6.2.0-11.module+el8.6.0+15668+464a1f31.2
  • M
Missing Release of Resource after Effective Lifetime

<15:6.2.0-11.module+el8.6.0+15668+464a1f31.2
  • L
Out-of-bounds Read

<15:6.2.0-20.module+el8.7.0+16689+53d59bc2.1
  • M
Unchecked Return Value

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
NULL Pointer Dereference

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
NULL Pointer Dereference

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Use After Free

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Out-of-Bounds

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Use After Free

<15:6.2.0-40.module+el8.9.0+20056+d9fb1ac3.1
  • M
Use After Free

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • L
Improper Locking

*
  • M
Improper Enforcement of Message Integrity During Transmission in a Communication Channel

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • M
Release of Invalid Pointer or Reference

*
  • M
Resource Exhaustion

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • L
Out-of-Bounds

<15:6.2.0-20.module+el8.7.0+16689+53d59bc2.1
  • L
Allocation of Resources Without Limits or Throttling

*
  • M
NULL Pointer Dereference

<15:6.2.0-11.module+el8.6.0+14707+5aa4b42d
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Use After Free

*
  • L
NULL Pointer Dereference

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
NULL Pointer Dereference

*
  • L
Allocation of Resources Without Limits or Throttling

*
  • M
Reachable Assertion

*
  • L
Information Exposure

*
  • L
Improper Access Control

*
  • L
NULL Pointer Dereference

*