qemu-img vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the qemu-img package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
CVE-2024-7409

<15:7.2.0-16.module+el8.10.0+90413+d8f5961d
  • M
Improper Certificate Validation

<15:6.2.0-53.module+el8.10.0+90410+bcde3bf4
  • H
NULL Pointer Dereference

<15:6.1.1-9.module+el8.10.0+90374+95a91213
  • H
Out-of-bounds Read

<15:6.1.1-9.module+el8.10.0+90374+95a91213
  • H
Reachable Assertion

<15:6.1.1-9.module+el8.10.0+90374+95a91213
  • H
CVE-2024-26327

<15:6.1.1-9.module+el8.10.0+90374+95a91213
  • H
CVE-2024-26328

<15:6.1.1-9.module+el8.10.0+90374+95a91213
  • M
Double Free

<15:6.2.0-53.module+el8.10.0+90410+bcde3bf4
  • H
Resource Exhaustion

<15:7.2.0-15.module+el8.10.0+90377+6a12a345
  • L
CVE-2024-3447

<15:4.2.1-35.module+el8.10.0+90415+56803fd5
  • H
Use After Free

<15:7.2.0-15.module+el8.10.0+90377+6a12a345
  • M
Uncontrolled Memory Allocation

<15:6.2.0-49.module+el8.10.0+90330+d0258130
  • M
CVE-2024-24474

<15:7.2.0-11.module+el8.9.0+90173+a3f3e83a
  • M
CVE-2024-1441

<15:4.2.1-34.module+el8.9.0+90333+3bd482f4
  • M
NULL Pointer Dereference

<15:6.2.0-49.module+el8.10.0+90330+d0258130
  • M
Improper Synchronization

<15:6.2.0-49.module+el8.10.0+90330+d0258130
  • M
Out-of-bounds Write

<15:6.2.0-49.module+el8.10.0+90330+d0258130
  • M
Divide By Zero

<15:7.2.0-11.module+el8.9.0+90173+a3f3e83a
  • M
Use After Free

<15:7.2.0-11.module+el8.9.0+90173+a3f3e83a
  • M
Use After Free

<15:7.2.0-11.module+el8.9.0+90173+a3f3e83a
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<15:6.2.0-49.module+el8.10.0+90330+d0258130
  • H
Improper Locking

<15:7.2.0-5.module+el8.8.0+21147+1292344f
  • M
Out-of-bounds Write

<15:4.2.1-28.module+el8.8.0+21148+e83324c8
  • M
Race Condition

<15:4.2.1-28.module+el8.8.0+21148+e83324c8
  • M
Out-of-bounds Write

<15:4.2.1-28.module+el8.8.0+21148+e83324c8
  • H
Buffer Overflow

<15:6.2.0-33.module+el8.8.0+21164+ed375313
  • H
NULL Pointer Dereference

<15:7.2.0-5.module+el8.8.0+21147+1292344f
  • M
Memory Leak

<15:6.2.0-32.module+el8.8.0+21044+01700444
  • H
Allocation of Resources Without Limits or Throttling

<15:6.1.1-6.module+el8.7.0+21035+a8208c98
  • M
Out-of-bounds Read

<15:6.2.0-32.module+el8.8.0+21044+01700444
  • M
Out-of-bounds Write

<15:6.2.0-32.module+el8.8.0+21044+01700444
  • M
Out-of-bounds Write

<15:6.2.0-32.module+el8.8.0+21044+01700444
  • M
Buffer Overflow

<15:6.2.0-32.module+el8.8.0+21044+01700444
  • M
Out-of-bounds Write

<15:6.2.0-32.module+el8.8.0+21044+01700444
  • M
Out-of-bounds Write

<15:6.2.0-32.module+el8.8.0+21044+01700444
  • H
Improper Privilege Management

<15:4.2.1-26.module+el8.7.0+21037+8ee66348
  • H
Use After Free

<15:4.2.1-24.module+el8.7.0+20894+2d7709ab
  • M
Integer Underflow

<15:6.2.0-32.module+el8.8.0+21044+01700444
  • H
Out-of-bounds Write

<15:4.2.1-24.module+el8.7.0+20894+2d7709ab
  • H
Buffer Overflow

<15:4.2.1-24.module+el8.7.0+20894+2d7709ab
  • M
Out-of-bounds Read

<15:6.2.0-21.module+el8.7.0+20905+f38afd22.2
  • L
Buffer Overflow

<15:6.2.0-20.module+el8.7.0+20875+5dd40464.1
  • H
Use After Free

<15:4.2.1-21.module+el8.6.0+20847+e0e2c16f
  • M
Buffer Overflow

<15:6.2.0-11.module+el8.6.0+20722+b0f1ae3c.2
  • M
Buffer Overflow

<15:6.2.0-11.module+el8.6.0+20722+b0f1ae3c.2
  • L
Out-of-Bounds

<15:6.2.0-20.module+el8.7.0+20875+5dd40464.1
  • M
Missing Release of Resource after Effective Lifetime

<15:6.2.0-11.module+el8.6.0+20722+b0f1ae3c.2
  • L
Improper Locking

<15:6.2.0-20.module+el8.7.0+20875+5dd40464.1
  • M
Missing Release of Resource after Effective Lifetime

<15:6.2.0-11.module+el8.6.0+20722+b0f1ae3c.2
  • M
Out-of-bounds Read

<15:6.2.0-11.module+el8.6.0+20659+3dcf7c70
  • M
Use After Free

<15:6.2.0-11.module+el8.6.0+20659+3dcf7c70
  • M
Out-of-bounds Write

<15:6.2.0-11.module+el8.6.0+20659+3dcf7c70
  • M
Out-of-bounds Write

<15:6.2.0-11.module+el8.6.0+20659+3dcf7c70
  • M
Out-of-bounds Write

<15:6.2.0-11.module+el8.6.0+20659+3dcf7c70
  • M
Out-of-bounds Write

<15:6.2.0-11.module+el8.6.0+20659+3dcf7c70
  • M
NULL Pointer Dereference

<15:6.2.0-11.module+el8.6.0+20659+3dcf7c70
  • M
Out-of-bounds Read

<15:6.2.0-11.module+el8.6.0+20659+3dcf7c70
  • M
Integer Overflow or Wraparound

<15:6.2.0-11.module+el8.6.0+20659+3dcf7c70
  • M
Out-of-bounds Write

<15:6.2.0-11.module+el8.6.0+20659+3dcf7c70
  • M
Out-of-bounds Write

<15:6.2.0-11.module+el8.6.0+20659+3dcf7c70
  • M
Out-of-bounds Read

<15:6.2.0-11.module+el8.6.0+20659+3dcf7c70
  • M
Unchecked Return Value

<15:6.2.0-11.module+el8.6.0+20659+3dcf7c70
  • M
Uncontrolled Recursion

<15:6.2.0-11.module+el8.6.0+20659+3dcf7c70
  • M
Use After Free

<15:6.2.0-11.module+el8.6.0+20659+3dcf7c70
  • M
Out-of-bounds Write

<15:6.2.0-11.module+el8.6.0+20659+3dcf7c70
  • M
Out-of-bounds Write

<15:6.2.0-11.module+el8.6.0+20659+3dcf7c70
  • M
CVE-2021-3716

<15:6.2.0-11.module+el8.6.0+20659+3dcf7c70
  • M
Out-of-bounds Write

<15:6.2.0-11.module+el8.6.0+20659+3dcf7c70
  • M
Out-of-bounds Write

<15:6.2.0-11.module+el8.6.0+20659+3dcf7c70
  • M
Out-of-bounds Write

<15:6.2.0-11.module+el8.6.0+20659+3dcf7c70
  • M
Out-of-bounds Write

<15:6.2.0-11.module+el8.6.0+20659+3dcf7c70
  • M
Out-of-bounds Write

<15:6.2.0-11.module+el8.6.0+20659+3dcf7c70
  • M
Out-of-bounds Write

<15:6.2.0-11.module+el8.6.0+20659+3dcf7c70
  • M
Out-of-bounds Read

<15:6.2.0-11.module+el8.6.0+20659+3dcf7c70
  • M
NULL Pointer Dereference

<15:6.2.0-11.module+el8.6.0+20659+3dcf7c70
  • L
Out-of-bounds Read

<15:6.2.0-20.module+el8.7.0+20875+5dd40464.1
  • H
NULL Pointer Dereference

<15:4.2.1-15.module+el8.5.0+20482+a450964e
  • H
NULL Pointer Dereference

<15:4.2.1-15.module+el8.5.0+20482+a450964e
  • H
Integer Overflow or Wraparound

<15:4.2.1-15.module+el8.5.0+20482+a450964e
  • H
Out-of-bounds Read

<15:4.2.1-15.module+el8.5.0+20482+a450964e
  • M
Improper Check for Dropped Privileges

<15:4.2.0-59.module+el8.5.0+20519+ef047602.2
  • H
Out-of-bounds Write

<15:4.2.1-15.module+el8.5.0+20482+a450964e
  • H
Release of Invalid Pointer or Reference

<15:4.2.1-15.module+el8.5.0+20482+a450964e
  • H
Out-of-Bounds

<15:4.2.1-11.module+el8.4.0+20319+6eb4347c
  • H
Use of Uninitialized Resource

<15:4.2.1-11.module+el8.4.0+20319+6eb4347c
  • H
Allocation of Resources Without Limits or Throttling

<15:4.2.1-11.module+el8.4.0+20319+6eb4347c
  • H
Access of Uninitialized Pointer

<15:4.2.1-11.module+el8.4.0+20319+6eb4347c
  • H
Integer Overflow or Wraparound

<15:4.2.1-11.module+el8.4.0+20319+6eb4347c
  • H
Memory Leak

<15:4.2.1-11.module+el8.4.0+20319+6eb4347c
  • H
Use After Free

<15:4.2.1-11.module+el8.4.0+20319+6eb4347c
  • H
Out-of-bounds Write

<15:4.2.1-11.module+el8.4.0+20319+6eb4347c
  • H
Divide By Zero

<15:4.2.1-11.module+el8.4.0+20319+6eb4347c
  • H
Out-of-Bounds

<15:4.2.1-11.module+el8.4.0+20319+6eb4347c
  • H
NULL Pointer Dereference

<15:4.2.1-11.module+el8.4.0+20319+6eb4347c
  • H
Off-by-one Error

<15:4.2.1-15.module+el8.5.0+20482+a450964e
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<15:4.2.1-15.module+el8.5.0+20482+a450964e
  • H
Access of Uninitialized Pointer

<15:4.2.1-15.module+el8.5.0+20482+a450964e
  • M
Incorrect Permission Assignment for Critical Resource

<15:4.2.0-59.module+el8.5.0+20410+46b2d321
  • H
Access of Uninitialized Pointer

<15:4.2.1-15.module+el8.5.0+20482+a450964e
  • M
Improper Locking

<15:4.2.0-59.module+el8.5.0+20410+46b2d321
  • H
Access of Uninitialized Pointer

<15:4.2.1-15.module+el8.5.0+20482+a450964e
  • M
Use After Free

<15:4.2.0-59.module+el8.5.0+20410+46b2d321
  • H
Access of Uninitialized Pointer

<15:4.2.1-15.module+el8.5.0+20482+a450964e
  • M
Resource Exhaustion

<15:6.2.0-11.module+el8.6.0+20659+3dcf7c70
  • H
Out-of-bounds Read

<15:4.2.1-11.module+el8.4.0+20319+6eb4347c
  • M
Reachable Assertion

<15:4.2.0-48.module+el8.4.0+20285+126f2e4b.3
  • M
Out-of-Bounds

<15:4.2.0-48.module+el8.4.0+20285+126f2e4b.3
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<15:4.2.1-15.module+el8.5.0+20482+a450964e
  • M
Out-of-bounds Read

<15:4.2.0-48.module+el8.4.0+20285+126f2e4b.3
  • M
CVE-2020-25707

<15:4.2.0-48.module+el8.4.0+20158+f6690737
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<15:4.2.0-48.module+el8.4.0+20158+f6690737
  • H
Out-of-bounds Write

<15:4.2.1-11.module+el8.4.0+20319+6eb4347c
  • H
Out-of-bounds Read

<15:4.2.1-15.module+el8.5.0+20482+a450964e
  • M
Reachable Assertion

<15:4.2.0-48.module+el8.4.0+20158+f6690737
  • M
Out-of-bounds Read

<15:4.2.0-48.module+el8.4.0+20158+f6690737
  • M
Out-of-bounds Read

<15:4.2.0-48.module+el8.4.0+20158+f6690737
  • H
Out-of-bounds Read

<15:4.2.1-15.module+el8.5.0+20482+a450964e
  • M
Out-of-bounds Read

<15:4.2.0-34.module+el8.3.0+20008+729ca284.5
  • H
Improper Privilege Management

<15:4.2.0-34.module+el8.3.0+9669+81410e06.4
  • M
Reachable Assertion

<15:4.2.0-48.module+el8.4.0+20158+f6690737
  • M
Double Free

<15:4.2.0-48.module+el8.4.0+20158+f6690737
  • M
Improper Cross-boundary Removal of Sensitive Data

<15:4.2.0-34.module+el8.3.0+7860+a7792d29
  • M
Missing Release of Resource after Effective Lifetime

<15:4.2.0-34.module+el8.3.0+7860+a7792d29
  • H
Out-of-bounds Read

<15:2.12.0-99.0.1.module+el8.2.0+7798+88bea828.4
  • H
Out-of-bounds Read

<15:2.12.0-99.0.1.module+el8.2.0+7798+88bea828.4
  • M
NULL Pointer Dereference

<15:4.2.0-34.module+el8.3.0+7860+a7792d29
  • M
Improper Input Validation

<15:4.2.0-34.module+el8.3.0+7860+a7792d29
  • M
Use After Free

<15:4.2.0-34.module+el8.3.0+7860+a7792d29
  • H
Memory Leak

<15:2.12.0-99.0.1.module+el8.2.0+7633+22bb8eb4.2
  • H
Buffer Overflow

<15:2.12.0-99.0.1.module+el8.2.0+7633+22bb8eb4.2
  • H
Out-of-bounds Write

<15:2.12.0-88.0.1.module+el8.1.0+5574+a95766b2.3
  • M
Use After Free

<15:4.2.0-34.module+el8.3.0+7860+a7792d29
  • H
Out-of-bounds Write

<15:2.12.0-88.0.1.module+el8.1.0+5574+a95766b2.3
  • M
CVE-2019-11135

<15:2.12.0-88.0.1.module+el8.1.0+5470+cad7d629.2
  • L
Integer Underflow

<15:2.12.0-88.0.1.module+el8.1.0+5378+c5e0f4d7
  • L
NULL Pointer Dereference

<15:2.12.0-88.0.1.module+el8.1.0+5378+c5e0f4d7
  • L
Use of Uninitialized Resource

<15:2.12.0-88.0.1.module+el8.1.0+5378+c5e0f4d7
  • H
CVE-2019-10166

<15:2.12.0-64.module+el8.0.0.z+5234+5e9073e3.2
  • H
Directory Traversal

<15:2.12.0-64.module+el8.0.0.z+5234+5e9073e3.2
  • H
Directory Traversal

<15:2.12.0-64.module+el8.0.0.z+5234+5e9073e3.2
  • H
Directory Traversal

<15:2.12.0-64.module+el8.0.0.z+5234+5e9073e3.2
  • H
Out-of-Bounds

<15:2.12.0-64.module+el8.0.0+5219+3c0c6858.2
  • H
Integer Overflow or Wraparound

<15:2.12.0-64.module+el8.0.0+5219+3c0c6858.2
  • H
Integer Overflow or Wraparound

<15:2.12.0-64.module+el8.0.0+5219+3c0c6858.2
  • H
Information Exposure

<15:2.12.0-64.module+el8.0.0+5219+3c0c6858.2
  • H
CVE-2019-11091

<15:2.12.0-64.module+el8.0.0+5219+3c0c6858.2
  • H
Information Exposure

<15:2.12.0-64.module+el8.0.0+5219+3c0c6858.2
  • H
Information Exposure

<15:2.12.0-64.module+el8.0.0+5219+3c0c6858.2
  • H
Integer Overflow or Wraparound

<15:2.12.0-64.module+el8.0.0+5219+3c0c6858.2
  • H
Out-of-bounds Write

<15:2.12.0-64.module+el8.0.0+5219+3c0c6858.2