qemu-guest-agent-win32 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the qemu-guest-agent-win32 package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Information Exposure

*
  • L
Reachable Assertion

*
  • M
Improper Synchronization

*
  • M
Out-of-bounds Read

*
  • M
Operation on a Resource after Expiration or Release

*
  • M
Double Free

*
  • M
Stack-based Buffer Overflow

*
  • M
Incorrect Synchronization

*
  • M
Race Condition

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • M
Integer Overflow or Wraparound

*
  • M
Race Condition

*
  • M
Missing Release of Resource after Effective Lifetime

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
NULL Pointer Dereference

*
  • L
Off-by-one Error

*
  • M
Use After Free

*
  • M
Use After Free

*
  • L
Improper Locking

*
  • M
Release of Invalid Pointer or Reference

*
  • H
Out-of-Bounds

*
  • H
Unquoted Search Path or Element

<2:0.12.1.2-2.355.el6_4.6
  • M
Access Restriction Bypass

<2:0.12.1.2-2.355.el6_4.5
  • H
Buffer Overflow

<2:0.12.1.2-2.355.el6_4.2
  • H
Operation on a Resource after Expiration or Release

*
  • H
Improper Handling of Syntactically Invalid Structure

*
  • H
Out-of-Bounds

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Out-of-bounds Read

*
  • M
Use After Free

*
  • L
Out-of-bounds Write

*
  • L
Reachable Assertion

*
  • M
Out-of-bounds Write

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Reachable Assertion

*
  • L
Incorrect Calculation of Buffer Size

*
  • M
Stack-based Buffer Overflow

*
  • M
Stack-based Buffer Overflow

*
  • L
Integer Overflow or Wraparound

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
Integer Overflow or Wraparound

*
  • L
Allocation of Resources Without Limits or Throttling

*
  • L
Use After Free

*
  • L
Out-of-Bounds

*
  • L
Access of Uninitialized Pointer

*
  • L
Access of Uninitialized Pointer

*
  • L
Access of Uninitialized Pointer

*
  • L
Reachable Assertion

*
  • L
Allocation of Resources Without Limits or Throttling

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Out-of-bounds Read

*
  • L
Out-of-Bounds

*
  • L
Divide By Zero

*
  • L
Divide By Zero

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Divide By Zero

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
NULL Pointer Dereference

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Out-of-bounds Read

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Buffer Overflow

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Buffer Overflow

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Insufficient Entropy

*
  • L
NULL Pointer Dereference

*
  • L
Use After Free

*
  • L
Out-of-bounds Write

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Missing Release of Resource after Effective Lifetime

*
  • L
Divide By Zero

*
  • L
Heap-based Buffer Overflow

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • L
NULL Pointer Dereference

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Insecure Temporary File

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Resource Exhaustion

*