qemu-kvm-common vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the qemu-kvm-common package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Out-of-bounds Read

<10:1.5.3-175.el7_9.4
  • M
Reachable Assertion

<10:1.5.3-175.el7_9.3
  • M
Out-of-bounds Write

<10:1.5.3-175.el7_9.3
  • H
Out-of-bounds Read

<10:1.5.3-175.el7_9.1
  • H
Use After Free

<10:1.5.3-175.el7_9.1
  • L
Memory Leak

<10:1.5.3-175.el7
  • H
Buffer Overflow

<10:1.5.3-173.el7_8.1
  • H
Out-of-bounds Write

<10:1.5.3-173.el7
  • H
CVE-2019-11135

<10:1.5.3-167.el7_7.4
  • H
Improper Handling of Exceptional Conditions

<10:1.5.3-167.el7_7.4
  • L
NULL Pointer Dereference

<10:1.5.3-167.el7_7.1
  • H
Out-of-bounds Write

<10:1.5.3-160.el7_6.3
  • L
Use of Uninitialized Resource

<10:1.5.3-167.el7
  • H
Information Exposure

<10:1.5.3-160.el7_6.2
  • H
CVE-2019-11091

<10:1.5.3-160.el7_6.2
  • H
Information Exposure

<10:1.5.3-160.el7_6.2
  • H
Information Exposure

<10:1.5.3-160.el7_6.2
  • L
CVE-2018-15746

<10:1.5.3-175.el7
  • H
Out-of-bounds Read

<10:1.5.3-156.el7_5.5
  • H
Out-of-bounds Write

<10:1.5.3-156.el7_5.5
  • M
Out-of-bounds Read

<10:1.5.3-156.el7_5.1
  • H
Information Exposure

<10:1.5.3-156.el7_5.2
  • L
Use After Free

<10:1.5.3-156.el7
  • L
Allocation of Resources Without Limits or Throttling

<10:1.5.3-156.el7
  • L
Out-of-bounds Read

<10:1.5.3-156.el7
  • L
Missing Release of Resource after Effective Lifetime

<10:1.5.3-156.el7
  • L
Out-of-bounds Read

<10:1.5.3-156.el7
  • H
Information Exposure

<10:1.5.3-141.el7_4.6
  • M
Out-of-bounds Write

<10:1.5.3-141.el7_4.4
  • M
Integer Overflow or Wraparound

<10:1.5.3-141.el7_4.4
  • M
CVE-2016-4020

<10:1.5.3-141.el7
  • M
CVE-2017-10664

<10:1.5.3-141.el7_4.1
  • M
Integer Overflow or Wraparound

<10:1.5.3-141.el7
  • H
Improper Input Validation

<10:1.5.3-126.el7_3.10
  • H
Out-of-bounds Read

<10:1.5.3-126.el7_3.9
  • M
Out-of-bounds Read

<10:1.5.3-141.el7
  • H
Out-of-Bounds

<10:1.5.3-126.el7_3.9
  • H
Out-of-Bounds

<10:1.5.3-126.el7_3.6
  • H
Out-of-bounds Write

<10:1.5.3-126.el7_3.5
  • H
Out-of-bounds Read

<10:1.5.3-126.el7_3.5
  • L
Out-of-Bounds

<10:1.5.3-126.el7_3.3
  • M
Integer Overflow or Wraparound

<10:1.5.3-126.el7
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<10:1.5.3-126.el7
  • M
Resource Exhaustion

<10:1.5.3-105.el7_2.7
  • M
Out-of-bounds Write

<10:1.5.3-105.el7_2.7
  • H
Out-of-Bounds

<10:1.5.3-105.el7_2.4
  • H
Out-of-Bounds

<10:1.5.3-105.el7_2.3
  • M
Resource Exhaustion

<10:1.5.3-86.el7_1.8
  • M
Use of Uninitialized Resource

<10:1.5.3-86.el7_1.6
  • H
Out-of-Bounds

<10:1.5.3-86.el7_1.5
  • H
Out-of-Bounds

<10:1.5.3-86.el7_1.5
  • H
Out-of-Bounds

<10:1.5.3-86.el7_1.2
  • H
NULL Pointer Dereference

<10:1.5.3-86.el7
  • H
Out-of-Bounds

<10:1.5.3-86.el7
  • H
Improper Input Validation

<10:1.5.3-86.el7
  • H
Improper Input Validation

<10:1.5.3-86.el7
  • L
Information Exposure

<10:1.5.3-60.el7_0.10
  • M
Out-of-Bounds

<10:1.5.3-60.el7_0.5
  • M
Numeric Errors

<10:1.5.3-60.el7_0.5
  • M
Out-of-Bounds

<10:1.5.3-60.el7_0.5
  • M
Out-of-Bounds

<10:1.5.3-60.el7_0.5
  • M
Out-of-Bounds

<10:1.5.3-60.el7_0.5
  • M
Numeric Errors

<10:1.5.3-60.el7_0.5
  • M
Out-of-Bounds

<10:1.5.3-60.el7_0.5
  • M
Arbitrary Code Injection

<10:1.5.3-60.el7_0.5
  • M
Out-of-Bounds

<10:1.5.3-60.el7_0.5
  • M
Out-of-Bounds

<10:1.5.3-60.el7_0.5
  • M
Numeric Errors

<10:1.5.3-60.el7_0.5
  • M
Arbitrary Code Injection

<10:1.5.3-60.el7_0.5
  • M
Out-of-Bounds

<10:1.5.3-60.el7_0.5
  • M
Improper Privilege Management

<10:1.5.3-60.el7_0.5
  • M
Improper Input Validation

<10:1.5.3-60.el7_0.5
  • M
Numeric Errors

<10:1.5.3-60.el7_0.2