qemu vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the qemu package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
CVE-2024-7409

*
  • M
Information Exposure

*
  • M
CVE-2024-6519

*
  • M
Operation on a Resource after Expiration or Release

<1:8.2.2+ds-0ubuntu1.4
  • M
CVE-2024-7730

<1:8.2.2+ds-0ubuntu1.4
  • M
Reachable Assertion

*
  • M
Out-of-bounds Read

*
  • H
Information Exposure

<1:3.1+dfsg-2ubuntu4
  • H
Information Exposure

<1:3.1+dfsg-2ubuntu4
  • H
Information Exposure

<1:3.1+dfsg-2ubuntu4
  • M
Information Exposure

<1:2.11+dfsg-1ubuntu10
  • M
CVE-2019-11091

<1:3.1+dfsg-2ubuntu4
  • L
NULL Pointer Dereference

*
  • L
Out-of-bounds Write

<1:4.2-1ubuntu1
  • L
Use After Free

<1:4.2-1ubuntu1
  • L
Out-of-bounds Read

*
  • L
NULL Pointer Dereference

<1:6.0+dfsg-1~ubuntu3
  • M
Out-of-bounds Write

<1:4.2-3ubuntu1
  • M
Out-of-bounds Write

<1:5.2+dfsg-2ubuntu1
  • L
Out-of-Bounds

*
  • M
Out-of-bounds Write

<1:5.2+dfsg-2ubuntu1
  • L
Use After Free

<1:5.2+dfsg-2ubuntu1
  • L
Out-of-bounds Read

<1:5.2+dfsg-2ubuntu1
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:5.2+dfsg-2ubuntu1
  • M
Reachable Assertion

<1:5.2+dfsg-2ubuntu1
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Reachable Assertion

<1:5.2+dfsg-2ubuntu1
  • L
Out-of-bounds Read

<1:6.0+dfsg-1~ubuntu3
  • L
NULL Pointer Dereference

<1:6.0+dfsg-1~ubuntu3
  • L
NULL Pointer Dereference

<1:6.0+dfsg-1~ubuntu3
  • L
NULL Pointer Dereference

*
  • M
Use After Free

<1:5.2+dfsg-6ubuntu2
  • L
NULL Pointer Dereference

<1:6.2+dfsg-2ubuntu5
  • L
Integer Overflow or Wraparound

<1:6.2+dfsg-2ubuntu5
  • L
Out-of-bounds Read

<1:5.2+dfsg-6ubuntu2
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Use After Free

<1:6.0+dfsg-1~ubuntu3
  • M
Out-of-Bounds

<1:6.0+dfsg-1~ubuntu3
  • L
Out-of-Bounds

<1:6.2+dfsg-2ubuntu8
  • L
Allocation of Resources Without Limits or Throttling

<1:6.0+dfsg-2expubuntu1
  • L
Out-of-Bounds

<1:7.0+dfsg-7ubuntu1
  • L
Resource Exhaustion

*
  • M
Buffer Overflow

<1:6.2+dfsg-2ubuntu8
  • M
Buffer Overflow

<1:6.2+dfsg-2ubuntu8
  • L
Missing Release of Resource after Effective Lifetime

<1:6.2+dfsg-2ubuntu8
  • L
Missing Release of Resource after Effective Lifetime

<1:6.2+dfsg-2ubuntu8
  • M
Off-by-one Error

*
  • L
Improper Preservation of Permissions

*
  • M
Allocation of Resources Without Limits or Throttling

<1:8.1.3+ds-1ubuntu1
  • M
NULL Pointer Dereference

<1:8.1.3+ds-1ubuntu1
  • L
Divide By Zero

<1:8.1.3+ds-1ubuntu1
  • M
Improper Synchronization

<1:8.1.3+ds-1ubuntu1
  • M
CVE-2024-26327

<1:8.2.2+ds-0ubuntu1.2
  • M
CVE-2024-26328

<1:8.2.2+ds-0ubuntu1.2