qemu-img vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the qemu-img package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Out-of-bounds Write

<15:4.2.1-28.el7
  • M
Race Condition

<15:4.2.1-28.el7
  • M
Out-of-bounds Write

<15:4.2.1-28.el7
  • H
Improper Privilege Management

<15:4.2.1-26.el7
  • H
Use After Free

<15:4.2.1-24.el7
  • H
Integer Underflow

<15:4.2.1-24.el7
  • H
Out-of-bounds Write

<15:4.2.1-24.el7
  • H
Buffer Overflow

<15:4.2.1-24.el7
  • H
Out-of-bounds Read

<15:4.2.1-26.el7
  • H
Use After Free

<15:4.2.1-21.el7
  • H
Buffer Overflow

<15:4.2.1-18.el7
  • H
Buffer Overflow

<15:4.2.1-18.el7
  • H
Out-of-Bounds

<15:4.2.1-18.el7
  • H
Missing Release of Resource after Effective Lifetime

<15:4.2.1-17.el7
  • H
Missing Release of Resource after Effective Lifetime

<15:4.2.1-17.el7
  • H
Use After Free

<15:4.2.1-17.el7
  • H
NULL Pointer Dereference

<15:4.2.1-16.el7
  • H
ELSA-2019-4631

<12:2.9.0-21.el7
  • H
NULL Pointer Dereference

<15:4.2.1-15.el7
  • H
NULL Pointer Dereference

<15:4.2.1-15.el7
  • H
Integer Overflow or Wraparound

<15:4.2.1-15.el7
  • H
Out-of-bounds Read

<15:4.2.1-15.el7
  • H
Out-of-bounds Write

<15:4.2.1-13.el7
  • H
Release of Invalid Pointer or Reference

<15:4.2.1-13.el7
  • H
Out-of-Bounds

<15:4.2.1-11.el7
  • H
Use of Uninitialized Resource

<15:4.2.1-11.el7
  • H
Allocation of Resources Without Limits or Throttling

<15:4.2.1-11.el7
  • H
Access of Uninitialized Pointer

<15:4.2.1-11.el7
  • H
Integer Overflow or Wraparound

<15:4.2.1-11.el7
  • H
Memory Leak

<15:4.2.1-11.el7
  • H
Use After Free

<15:4.2.1-11.el7
  • H
Out-of-bounds Write

<15:4.2.1-11.el7
  • H
Divide By Zero

<15:4.2.1-10.el7
  • H
Out-of-Bounds

<15:4.2.1-9.el7
  • H
NULL Pointer Dereference

<15:4.2.1-9.el7
  • H
Race Condition

<15:4.2.1-5.el7
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<15:4.2.1-4.el7
  • H
Out-of-bounds Read

<15:4.2.1-5.el7
  • H
Divide By Zero

<15:4.2.1-4.el7
  • H
CVE-2020-10702

<15:4.2.1-4.el7
  • H
Out-of-bounds Read

<15:4.2.1-4.el7
  • H
Incorrect Calculation

<15:4.2.1-4.el7
  • H
Out-of-bounds Read

<15:4.2.1-4.el7
  • H
Out-of-bounds Read

<15:4.2.1-4.el7
  • H
Use After Free

<15:4.2.1-4.el7
  • H
Buffer Overflow

<15:4.2.1-4.el7
  • H
Out-of-bounds Write

<15:4.2.1-4.el7
  • H
Out-of-bounds Write

<15:4.2.1-4.el7
  • H
Out-of-bounds Read

<15:4.2.1-4.el7
  • H
NULL Pointer Dereference

<15:4.2.1-4.el7
  • H
Integer Overflow or Wraparound

<15:4.2.1-4.el7
  • H
Off-by-one Error

<15:4.2.1-13.el7
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<15:4.2.1-13.el7
  • H
Access of Uninitialized Pointer

<15:4.2.1-13.el7
  • H
Access of Uninitialized Pointer

<15:4.2.1-13.el7
  • H
Access of Uninitialized Pointer

<15:4.2.1-13.el7
  • H
Access of Uninitialized Pointer

<15:4.2.1-13.el7
  • H
Out-of-bounds Read

<15:4.2.1-9.el7
  • H
Reachable Assertion

<15:4.2.1-5.el7
  • H
Out-of-Bounds

<15:4.2.1-4.el7
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<15:4.2.1-15.el7
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<15:4.2.1-4.el7
  • H
Out-of-bounds Write

<15:4.2.1-9.el7
  • H
Out-of-bounds Read

<15:4.2.1-13.el7
  • H
Reachable Assertion

<15:4.2.1-4.el7
  • H
Out-of-bounds Read

<15:4.2.1-5.el7
  • H
Out-of-bounds Read

<15:4.2.1-5.el7
  • H
Out-of-bounds Read

<15:4.2.1-13.el7
  • H
Reachable Assertion

<15:4.2.1-4.el7
  • M
Out-of-bounds Write

<10:1.5.3-175.el7_9.3
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<15:3.1.0-7.el7
  • H
Out-of-bounds Read

<15:4.2.1-4.el7
  • H
Out-of-bounds Read

<15:4.2.1-4.el7
  • H
Use After Free

<10:1.5.3-175.el7_9.1
  • L
Memory Leak

<10:1.5.3-175.el7
  • H
Buffer Overflow

<10:1.5.3-173.el7_8.1
  • H
Out-of-bounds Write

<15:3.1.0-7.el7
  • H
Out-of-bounds Write

<10:1.5.3-173.el7
  • H
Buffer Overflow

<15:3.1.0-5.el7
  • H
Integer Overflow or Wraparound

<15:3.1.0-5.el7
  • H
Out-of-bounds Read

<15:3.1.0-3.el7
  • H
Integer Overflow or Wraparound

<15:3.1.0-3.el7
  • H
Out-of-Bounds

<15:3.1.0-3.el7
  • H
Exposure of Resource to Wrong Sphere

<15:3.1.0-3.el7
  • H
Integer Overflow or Wraparound

<15:3.1.0-3.el7
  • H
Missing Release of Resource after Effective Lifetime

<15:3.1.0-5.el7
  • H
Out-of-bounds Read

<15:3.1.0-1.el7
  • H
Race Condition

<12:2.9.0-19.el7
  • H
Out-of-bounds Read

<12:2.9.0-19.el7
  • H
Out-of-bounds Read

<15:3.1.0-1.el7
  • H
NULL Pointer Dereference

<15:3.1.0-1.el7
  • H
NULL Pointer Dereference

<15:3.1.0-1.el7
  • H
Unchecked Return Value

<15:3.1.0-1.el7
  • H
Time-of-check Time-of-use (TOCTOU)

<15:3.0.0-4.el7
  • H
Use After Free

<12:2.9.0-19.el7
  • H
Missing Release of Resource after Effective Lifetime

<15:3.1.0-1.el7
  • H
CVE-2019-11135

<10:1.5.3-167.el7_7.4
  • H
Improper Handling of Exceptional Conditions

<15:3.1.0-7.el7
  • H
NULL Pointer Dereference

<15:3.1.0-5.el7
  • H
Out-of-bounds Write

<12:2.9.0-20.el7
  • H
Use of Uninitialized Resource

<15:3.1.0-3.el7
  • H
Out-of-Bounds

<15:3.1.0-3.el7
  • H
Information Exposure

<15:3.1.0-3.el7
  • H
CVE-2019-11091

<15:3.1.0-3.el7
  • H
Information Exposure

<15:3.1.0-3.el7
  • H
Information Exposure

<15:3.1.0-3.el7
  • H
Race Condition

<12:2.9.0-20.el7
  • H
NULL Pointer Dereference

<15:3.1.0-1.el7
  • H
Stack-based Buffer Overflow

<15:3.1.0-1.el7
  • H
Missing Release of Resource after Effective Lifetime

<15:3.1.0-1.el7
  • H
NULL Pointer Dereference

<15:3.1.0-1.el7
  • H
Race Condition

<15:3.1.0-1.el7
  • H
Out-of-bounds Write

<15:3.1.0-1.el7
  • H
Reachable Assertion

<15:3.1.0-1.el7
  • H
Out-of-Bounds

<15:3.1.0-1.el7
  • H
Out-of-bounds Read

<15:3.1.0-1.el7
  • H
Missing Release of Resource after Effective Lifetime

<15:3.1.0-1.el7
  • H
Divide By Zero

<15:3.1.0-1.el7
  • H
Out-of-bounds Read

<15:3.1.0-1.el7
  • H
Resource Exhaustion

<15:3.1.0-1.el7
  • H
Incorrect Permission Assignment for Critical Resource

<15:3.1.0-1.el7
  • H
Integer Overflow or Wraparound

<15:3.1.0-1.el7
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<15:3.1.0-1.el7
  • H
Improper Input Validation

<15:3.1.0-1.el7
  • L
CVE-2018-15746

<10:1.5.3-175.el7
  • H
Out-of-Bounds

<15:3.1.0-1.el7
  • H
Integer Overflow or Wraparound

<15:3.1.0-1.el7
  • H
Incorrect Permission Assignment for Critical Resource

<15:3.1.0-1.el7
  • H
Integer Overflow or Wraparound

<15:3.1.0-1.el7
  • H
Stack-based Buffer Overflow

<15:3.1.0-1.el7
  • H
Integer Overflow or Wraparound

<15:3.1.0-1.el7
  • H
Out-of-bounds Read

<15:3.1.0-1.el7
  • H
Out-of-bounds Write

<15:3.1.0-1.el7
  • H
Out-of-bounds Read

<15:3.1.0-1.el7
  • H
Information Exposure

<15:3.1.0-1.el7
  • H
Use After Free

<15:3.1.0-1.el7
  • H
Allocation of Resources Without Limits or Throttling

<15:3.1.0-1.el7
  • H
Out-of-bounds Read

<15:3.1.0-1.el7
  • H
Missing Release of Resource after Effective Lifetime

<15:3.1.0-1.el7
  • H
Out-of-bounds Read

<15:3.1.0-1.el7
  • H
Information Exposure

<15:3.1.0-1.el7
  • H
Information Exposure

<15:3.1.0-1.el7
  • H
Information Exposure

<15:3.1.0-1.el7
  • H
Out-of-bounds Write

<15:3.1.0-1.el7
  • H
Integer Overflow or Wraparound

<15:3.1.0-1.el7
  • M
CVE-2016-4020

<10:1.5.3-141.el7
  • M
CVE-2017-10664

<10:1.5.3-141.el7_4.1
  • M
Integer Overflow or Wraparound

<10:1.5.3-141.el7
  • H
Improper Input Validation

<15:3.1.0-5.el7
  • H
Out-of-bounds Read

<10:1.5.3-126.el7_3.9
  • H
Out-of-bounds Read

<15:3.1.0-1.el7
  • H
Out-of-Bounds

<10:1.5.3-126.el7_3.9
  • H
Out-of-Bounds

<10:1.5.3-126.el7_3.6
  • H
Out-of-bounds Write

<10:1.5.3-126.el7_3.5
  • H
Out-of-bounds Read

<10:1.5.3-126.el7_3.5
  • L
Out-of-Bounds

<10:1.5.3-126.el7_3.3
  • M
Integer Overflow or Wraparound

<10:1.5.3-126.el7
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<10:1.5.3-126.el7
  • M
Resource Exhaustion

<10:1.5.3-105.el7_2.7
  • M
Out-of-bounds Write

<10:1.5.3-105.el7_2.7
  • H
Out-of-Bounds

<10:1.5.3-105.el7_2.4
  • H
Out-of-Bounds

<10:1.5.3-105.el7_2.3
  • M
Resource Exhaustion

<10:1.5.3-86.el7_1.8
  • M
Use of Uninitialized Resource

<10:1.5.3-86.el7_1.6
  • H
Out-of-Bounds

<10:1.5.3-86.el7_1.5
  • H
Out-of-Bounds

<10:1.5.3-86.el7_1.5
  • H
Out-of-Bounds

<10:1.5.3-86.el7_1.2
  • H
NULL Pointer Dereference

<10:1.5.3-86.el7
  • H
Out-of-Bounds

<10:1.5.3-86.el7
  • H
Improper Input Validation

<10:1.5.3-86.el7
  • H
Improper Input Validation

<10:1.5.3-86.el7
  • L
Information Exposure

<10:1.5.3-60.el7_0.10
  • M
Out-of-Bounds

<10:1.5.3-60.el7_0.5
  • M
Numeric Errors

<10:1.5.3-60.el7_0.5
  • M
Out-of-Bounds

<10:1.5.3-60.el7_0.5
  • M
Out-of-Bounds

<10:1.5.3-60.el7_0.5
  • M
Out-of-Bounds

<10:1.5.3-60.el7_0.5
  • M
Numeric Errors

<10:1.5.3-60.el7_0.5
  • M
Out-of-Bounds

<10:1.5.3-60.el7_0.5
  • M
Arbitrary Code Injection

<10:1.5.3-60.el7_0.5
  • M
Out-of-Bounds

<10:1.5.3-60.el7_0.5
  • M
Out-of-Bounds

<10:1.5.3-60.el7_0.5
  • M
Numeric Errors

<10:1.5.3-60.el7_0.5
  • M
Arbitrary Code Injection

<10:1.5.3-60.el7_0.5
  • M
Out-of-Bounds

<10:1.5.3-60.el7_0.5
  • M
Improper Privilege Management

<10:1.5.3-60.el7_0.5
  • M
Improper Input Validation

<10:1.5.3-60.el7_0.5
  • M
Numeric Errors

<10:1.5.3-60.el7_0.2