qemu-project/qemu vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://gitlab.com|qemu-project/qemu package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Use After Free

[0,)
  • M
Use of Uninitialized Resource

[0,)
  • M
Reachable Assertion

[0,)
  • H
Heap-based Buffer Overflow

[,9.1.0)
  • H
Improper Synchronization

[0,)
  • M
Out-of-bounds Read

[0,)
  • H
Improper Input Validation

[0,)
  • M
Operation on a Resource after Expiration or Release

[,9.0.0-rc4)
  • M
Reachable Assertion

[,9.0.0-rc3)
  • H
Double Free

[0,)
  • M
Heap-based Buffer Overflow

[0,)
  • C
Code Injection

[,8.2.0-rc0)
  • C
Buffer Overflow

[,8.2.0-rc0)
  • H
Buffer Overflow

[0,)
  • H
Buffer Overflow

[7.1.0,)
  • M
NULL Pointer Dereference

[0,)
  • M
Stack-based Buffer Overflow

[0,)
  • M
Race Condition

[0,)
  • M
Division by Zero

[,8.1.0-rc3)
  • H
Use After Free

[,5.0.0-rc0)
  • H
NULL Pointer Dereference

[,8.1.0-rc3)
  • M
Heap-based Buffer Overflow

[0,)
  • M
Out-of-bounds Read

[0,)
  • M
Race Condition

[,8.1.0-rc0)
  • M
Use After Free

[0,)
  • M
Denial of Service (DoS)

[0,)
  • M
Access Restriction Bypass

[0,)
  • H
Denial of Service (DoS)

[0,)
  • H
Buffer Overflow

[0,)
  • H
Use After Free

[0,)
  • M
Out-of-bounds Read

[0,)
  • H
Execution with Unnecessary Privileges

[0,)
  • M
Integer Overflow to Buffer Overflow

[,7.2.0-rc0)
  • M
Out-of-bounds Read

[,7.2.0-rc3)
  • M
Denial of Service (DoS)

[0,)
  • M
Denial of Service (DoS)

[,2.0.0-rc1)
  • L
Denial of Service (DoS)

[,2.0.0-rc1)
  • M
Improper Input Validation

[,2.0.0-rc1)
  • M
Denial of Service (DoS)

[0,)
  • H
Privilege Escalation

[,6.2.0-7)
  • M
Denial of Service (DoS)

[0,)
  • H
Use of Uninitialized Resource

[0,)
  • L
Out-of-bounds Write

[0,)
  • M
Loop with Unreachable Exit Condition

[,6.0.0-rc0)
  • L
Buffer Overflow

[,6.1.0-rc0)
  • M
Out-of-bounds Read

[,4.2.0-34)
  • H
Off-by-one Error

[,6.2.0-rc0)
  • M
Integer Overflow or Wraparound

[,6.1.0)
  • H
Access of Uninitialized Pointer

[,6.1.0)
  • H
NULL Pointer Dereference

[,6.2.0)
  • M
Out-of-bounds Read

[,6.2.0-rc2)
  • H
Use After Free

[,7.0.0)
  • L
Use After Free

[,6.0.0)
  • H
Heap-based Buffer Overflow

[,6.0.0)
  • H
Integer Overflow or Wraparound

[,6.0.0)
  • H
Use After Free

[0,)
  • H
Denial of Service (DoS)

[,7.0.0-rc0)
  • H
Use-After-Free

[,6.2.0)
  • L
Memory Leak

[,7.0.0-rc0)
  • L
NULL Pointer Dereference

[,5.1.1)
  • H
Out-of-Bounds

[,2.4.0.1)
  • H
Out-of-bounds Write

[0,)
  • M
Out-of-bounds Write

[2.12.0,4.2.1)
  • L
Information Exposure

[,2.9.0)
  • M
Access Restriction Bypass

[,0.14.1)
  • M
Memory Leak

[,2.8.0)
  • M
Out-of-bounds Read

[1.6.0,2.3.1]
  • M
Out-of-bounds Read

[0,)
  • M
Denial of Service (DoS)

[,2.0][2.0,2.0.1)
  • M
Memory Leak

[,2.9.0)
  • M
Denial of Service (DoS)

[,6.0.0)
  • M
Denial of Service (DoS)

[,5.0.1)
  • M
Out-of-bounds Read

[,2.10.0)
  • M
Out-of-Bounds

[,2.1.3)
  • H
Resource Management Errors

[,0.11.0)
  • M
Buffer Overflow

[,2.7.0)
  • H
Out-of-bounds Write

[,2.5.0)
  • M
Time of Check Time of Use (TOCTOU)

[,3.1.0)
  • M
Denial of Service (DoS)

[,2.7.0)
  • M
Resource Management Errors

[0,)
  • M
Out-of-bounds Write

[,5.2.0)
  • H
Denial of Service (DoS)

[,2.11.0)
  • M
Out-of-bounds Read

[,2.7.0)
  • H
Race Condition

[,2.8.0)
  • H
Out-of-Bounds

[,1.7.2)
  • H
Improper Input Validation

[,1.7.2)
  • M
Denial of Service (DoS)

[,1.0]
  • H
Out-of-bounds Write

[,2.5.1.1)
  • M
Out-of-bounds Read

[,5.1.0)
  • M
Memory Leak

[,2.8.0)
  • H
Out-of-Bounds

[,2.3.1)
  • M
Arbitrary Code Execution

[,0.9.0]
  • M
Memory Leak

[,2.5.1.1)
  • H
Out-of-Bounds

[,1.7.2)
  • H
Out-of-bounds Write

[,3.0.0)
  • M
Use After Free

[,2.8.0)
  • M
Information Exposure

[,2.8.0)
  • M
Out-of-bounds Read

[,2.10.0)
  • M
Memory Leak

[,2.8.1.1)
  • M
Denial of Service (DoS)

[,2.9.0)
  • M
Race Condition

[0,)
  • C
Out-of-bounds Read

[,2.8.1)
  • H
Privilege Escalation

[,2.2.0)
  • L
Out-of-bounds Write

[0,5.0.1)
  • M
Memory Leak

[,2.8.0)
  • M
Out-of-bounds Read

[,2.12.0)
  • M
Information Exposure

[,2.2.0)
  • C
Race Condition

[,2.5.0)
  • M
Resource Management Errors

[0,)
  • M
Buffer Overflow

[,2.4.0)
  • H
Out-of-Bounds

[,0.14.1)
  • M
Buffer Overflow

[,2.7.0)
  • M
Divide By Zero

[,2.8.0)
  • H
Privilege Escalation

[1.3.0,1.5.0)
  • M
Out-of-bounds Write

[,5.2.0)
  • M
NULL Pointer Dereference

[,6.1.0)
  • M
NULL Pointer Dereference

[,2.6.0)
  • H
Out-of-Bounds

[,1.7.2)
  • H
Out-of-bounds Write

[,2.5.0)
  • M
Out-of-bounds Read

[,2.9.0)
  • H
Out-of-bounds Write

[,0.8.2]
  • L
Divide By Zero

[,5.0.0)
  • M
Out-of-Bounds

[,2.8.0)
  • L
Integer Overflow or Wraparound

[,6.0.0)
  • L
Denial of Service (DoS)

[,5.2.0)
  • M
Use After Free

[0,)
  • H
Improper Input Validation

[0,)
  • M
Improper Input Validation

[,2.5.0)
  • M
Access Restriction Bypass

[0.1.0,0.9.1]
  • H
NULL Pointer Dereference

[0,)
  • H
Improper Input Validation

[0,)
  • M
Memory Leak

[,2.9.0)
  • H
Out-of-bounds Write

[0,6.2.0-rc0)
  • M
NULL Pointer Dereference

[,2.1.2)
  • H
Out-of-Bounds

[,0.10.0)
  • M
Denial of Service (DoS)

[,2.8.0)
  • M
Resource Management Errors

[,2.5.0)
  • M
Buffer Overflow

[0,4.1.0)
  • M
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[,2.5.1.1)
  • M
Memory Leak

[,2.9.0)
  • L
Resource Management Errors

[,1.1]
  • H
Access Restriction Bypass

[,1.4.1]
  • M
Improper Initialization

[,2.8.0)
  • M
Improper Authentication

[,0.11.1)
  • L
Resource Management Errors

[1.4.0,1.6.0]
  • H
Denial of Service (DoS)

[,2.7.0)
  • M
Integer Overflow or Wraparound

[,3.0.1)
  • H
Denial of Service (DoS)

[,1.7.2)
  • L
Use After Free

[2.10.0,6.0.0)
  • H
Integer Overflow or Wraparound

[,3.1)
  • M
Denial of Service (DoS)

[,6.1.0)
  • M
Out-of-bounds Read

[,2.9.0)
  • M
Out-of-Bounds

[,1.6.0]
  • M
Out-of-bounds Write

[,5.0.0)
  • C
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[,0.14.0]
  • M
Out-of-bounds Write

[0,5.0.0)
  • L
Use After Free

[0,)
  • H
Out-of-Bounds

[,1.7.2)
  • L
Denial of Service (DoS)

[,2.4.0.1)
  • M
Denial of Service (DoS)

[,2.8.0)
  • H
Integer Overflow or Wraparound

[,3.0.0)
  • M
Denial of Service (DoS)

[4.0.0,5.0.0)
  • H
Improper Input Validation

[0.1.0,1.1]
  • H
Out-of-Bounds

[,2.6.0)
  • H
Resource Management Errors

[,2.10.1)
  • H
Improper Input Validation

[,2.10.1)
  • M
Denial of Service (DoS)

[0,)
  • H
Memory Leak

[,2.10.0)
  • M
Memory Leak

[,2.8.0)
  • M
Denial of Service (DoS)

[,2.9.0)
  • H
Denial of Service (DoS)

[,1.7.2)
  • H
Privilege Escalation

[,1.5.3)
  • L
Denial of Service (DoS)

[,5.0.0)
  • H
Improper Input Validation

[,2.11.1)
  • M
Denial of Service (DoS)

[,2.1.0)
  • H
Out-of-Bounds

[,1.7.2)
  • M
Denial of Service (DoS)

[0,5.1.1)
  • H
Out-of-Bounds

[,1.7.2)
  • H
Out-of-Bounds

[,2.3.1)
  • M
Out-of-bounds Read

[,5.1.0)
  • H
Out-of-bounds Read

[0,)
  • M
Memory Leak

[,2.8.0)
  • H
Denial of Service (DoS)

[,2.10.0)
  • L
Out-of-bounds Read

[0,5.0.0)
  • M
Improper Input Validation

[,2.2.0)
  • M
Out-of-Bounds

[,5.0)
  • M
NULL Pointer Dereference

[0,)
  • M
Denial of Service (DoS)

[,2.8.0)
  • H
Out-of-bounds Write

[,6.1.0)
  • M
Out-of-bounds Write

[0,libslirp-4.2.0)
  • C
Information Exposure

[,2.9.0)
  • M
Divide By Zero

[,2.8.0)
  • L
Use After Free

[0,)
  • M
Out-of-bounds Read

[0,5.2.0)
  • M
Denial of Service (DoS)

[,2.5.0)
  • M
Improper Validation of Array Index

[,2.8.0)
  • M
NULL Pointer Dereference

[,2.10.0)
  • M
Incorrect Authorization

[,2.4.0)
  • M
Memory Leak

[,2.9.0)
  • H
Improper Input Validation

[,2.2.0)
  • M
Insecure Randomness

[,2.6.0)
  • M
Memory Leak

[,2.8.0)
  • L
Out-of-bounds Read

[0,)
  • M
Memory Leak

[,2.9.0)
  • M
Memory Leak

[,2.9.0)
  • M
Use of Uninitialized Resource

[,2.7.0)
  • C
Out-of-Bounds

[,2.9.0]
  • H
Buffer Overflow

[,1.7.0)
  • H
Symlink Attack

[,2.9)
  • M
Buffer Overflow

[,2.8.0)
  • C
Improper Input Validation

[,2.12.0)
  • M
Improper Input Validation

[2.8.0,2.9.0]
  • M
Denial of Service (DoS)

[,0.8.2]
  • L
Improper Data Handling

[,3.1.0)
  • C
Buffer Overflow

[,2.5.0)
  • M
NULL Pointer Dereference

[,2.6.0)
  • H
Denial of Service (DoS)

[,2.3.0)
  • H
Out-of-Bounds

[,1.7.2)
  • H
Out-of-Bounds

[,1.7.2)
  • M
Denial of Service (DoS)

[,2.8.0)
  • H
Improper Input Validation

[,2.10.0)
  • M
Out-of-bounds Read

[,2.11.0)
  • M
Memory Leak

[,2.9.0)
  • H
Out-of-bounds Read

[0,)
  • M
Memory Leak

[,2.10.0)
  • M
Denial of Service (DoS)

[,2.5.1)
  • M
Memory Leak

[,2.8.1.1)
  • M
Resource Management Errors

[,2.9.0)
  • M
Improper Input Validation

[,1.7.2)
  • M
Improper Input Validation

[0,)
  • M
Divide By Zero

[,2.11.0)
  • H
Integer Overflow or Wraparound

[,2.11.0)
  • M
Resource Management Errors

[0,)
  • H
Out-of-Bounds

[1.1.2,2.1.0)
  • M
Out-of-bounds Write

[0,)
  • H
Out-of-bounds Write

[,2.4.0)
  • M
Out-of-Bounds

[0,)
  • L
NULL Pointer Dereference

[,5.1.1)
  • M
Divide By Zero

[,2.0.1)
  • M
Information Exposure

[,6.1.0)
  • H
Integer Overflow or Wraparound

[,2.9.0)
  • M
Integer Overflow or Wraparound

[,3.1)
  • H
Remote Code Execution (RCE)

[,1.7.2)
  • M
Memory Leak

[,2.8.0)
  • M
Out-of-bounds Write

[,2.7.0)
  • M
Memory Leak

[,2.9.0)
  • C
Out-of-Bounds

[,2.9.0)
  • M
Out-of-bounds Read

[,3.1)
  • M
Use After Free

[,6.0.0)
  • H
Out-of-Bounds

[,1.7.2)
  • M
Out-of-bounds Write

[,2.5.1.1)
  • H
NULL Pointer Dereference

[0,)
  • M
Denial of Service (DoS)

[,2.8.0)
  • M
CVE-2007-1366

[,0.8.2]
  • H
Out-of-Bounds

[,2.3.1)
  • M
NULL Pointer Dereference

[,1.7.2)
  • M
Information Exposure

[,0.9.1]
  • M
Memory Leak

[,2.9.0)
  • H
Out-of-Bounds

[,1.7.2)
  • M
Information Exposure

[,2.7.0)
  • M
Memory Leak

[,2.8.0)
  • M
Out-of-bounds Write

[,5.0.0)
  • M
Out-of-bounds Write

[0,4.2.0)
  • H
Out-of-bounds Write

[,2.7.0)
  • M
Out-of-bounds Write

[,2.10.0)
  • M
Resource Management Errors

[1.0,2.1.3]
  • M
Memory Leak

[,2.8.0)
  • H
Out-of-Bounds

[,2.3.1)
  • M
Out-of-bounds Read

[,2.9.0)
  • H
Out-of-Bounds

[,1.7.2)
  • M
Out-of-Bounds

[,6.0.0)
  • M
Race Condition

[,2.10.0)
  • M
Out-of-Bounds

[,6.1.0)
  • H
Out-of-Bounds

[,1.7.2)
  • C
Out-of-bounds Read

[,2.8.0)
  • H
Denial of Service (DoS)

[,1.7.2)
  • M
Out-of-bounds Write

[,2.7.0)
  • M
Out-of-bounds Read

[0,)
  • M
Information Exposure

[,2.7.0)
  • L
Out-of-bounds Read

[0,5.0.1)
  • H
Out-of-Bounds

[0,)
  • M
Denial of Service (DoS)

[,2.6.0)
  • M
Memory Leak

[,2.9.0)
  • M
Integer Overflow or Wraparound

[1.5.0,2.10.2)
  • L
Improper Preservation of Permissions

[5.0.0,5.2.50)
  • H
Use After Free

[,6.0.0)
  • M
NULL Pointer Dereference

[,6.0.0)
  • H
Buffer Overflow

[,2.9.0)
  • M
NULL Pointer Dereference

[,6.0.0)
  • M
Denial of Service (DoS)

[,2.4.0.1)
  • M
NULL Pointer Dereference

[,2.6.0)
  • M
Integer Overflow or Wraparound

[,2.7.0)
  • M
Out-of-bounds Read

[2.10.0,3.1.0)
  • C
Buffer Overflow

[,2.7.0)
  • H
CVE-2019-13164

[0,)
  • H
Denial of Service (DoS)

[,0.9.1]
  • M
Denial of Service (DoS)

[,2.6.1)
  • H
Out-of-Bounds

[,1.7.2)
  • M
Integer Overflow or Wraparound

[,2.9.0)
  • M
Denial of Service (DoS)

[0,5.0.1)
  • H
Information Exposure

[,2.10.0)
  • H
Out-of-Bounds

[,1.7.2)
  • M
Denial of Service (DoS)

[,2.6.0)
  • M
Denial of Service (DoS)

[,2.8.0)
  • H
Denial of Service (DoS)

[,2.5.1)
  • M
Memory Leak

[,2.8.0)
  • M
Denial of Service (DoS)

[,2.9.0)
  • H
Buffer Overflow

[,2.9)
  • M
Buffer Overflow

[,2.8.0)
  • H
Use After Free

[,2.10.2)
  • M
Denial of Service (DoS)

[,2.8.0)
  • H
Improper Input Validation

[,1.2.0)
  • H
Out-of-Bounds

[,0.11.1)
  • H
Out-of-Bounds

[,1.7.2)
  • M
Memory Leak

[,6.1.0)
  • M
Off-by-one Error

[,2.2.0)
  • M
Denial of Service (DoS)

[,2.8.0)
  • M
Denial of Service (DoS)

[,2.9.0)
  • L
Code

[,2.3.1)
  • H
Out-of-Bounds

[,2.8.1)
  • M
Out-of-bounds Read

[0,)
  • M
Denial of Service (DoS)

[,2.9.0)
  • H
Directory Traversal

[,3.1.0)
  • M
Resource Management Errors

[,0.10.0)
  • M
Divide By Zero

[,5.2.0)
  • M
Out-of-bounds Write

[,2.11.0)
  • L
NULL Pointer Dereference

[0,5.0.1)
  • L
Memory Leak

[0,4.2.0)
  • H
Directory Traversal

[0,)
  • L
NULL Pointer Dereference

[,5.1.0)
  • M
Out-of-bounds Write

[,2.7.0)
  • M
Denial of Service (DoS)

[,2.9.0)
  • H
Remote Code Execution (RCE)

[,1.7.2)
  • M
NULL Pointer Dereference

[,2.10.0)
  • M
Denial of Service (DoS)

[0,5.2.0)
  • M
Out-of-bounds Write

[2.2.0,2.4.0)
  • H
Memory Leak

[,2.6.0)
  • M
Memory Leak

[,2.8.0)
  • M
Denial of Service (DoS)

[,2.6.0)
  • M
Information Exposure

[,2.8.0)
  • H
Remote Code Execution (RCE)

[,1.7.2)
  • M
Denial of Service (DoS)

[,2.8.0)
  • L
Integer Overflow or Wraparound

[,5.1.0)
  • H
Buffer Overflow

[,0.8.2]
  • M
Memory Leak

[,2.9.0)
  • L
NULL Pointer Dereference

[0,5.1.1)
  • H
Divide By Zero

[,2.5.0)
  • M
Divide By Zero

[,2.5.0)
  • H
Use After Free

[,2.6.0)
  • H
Out-of-Bounds

[,0.8.2]
  • H
Privilege Escalation

[5.0.0,6.0.0)
  • C
Out-of-bounds Write

[,2.7.0)
  • M
Out-of-bounds Write

[0,)
  • M
Out-of-bounds Read

[0,4.2.0)
  • M
Off-by-one Error

[,2.6.0)
  • M
Out-of-bounds Read

[0,)
  • M
Use of Uninitialized Resource

[0,)
  • M
Memory Leak

[,2.9.0)
  • H
Out-of-bounds Write

[0,65-7.fc9)
  • H
NULL Pointer Dereference

[0,)
  • H
Integer Overflow or Wraparound

[0,)
  • M
Incorrect Type Conversion or Cast

[,2.8.0)
  • M
Memory Leak

[,2.8.0)
  • M
Divide By Zero

[,2.8.0)
  • M
Denial of Service (DoS)

[,2.4.0)
  • M
Out-of-bounds Read

[,2.7.0)
  • H
Out-of-Bounds

[,2.4.0.1)
  • H
Integer Overflow or Wraparound

[,1.7.2)
  • M
Out-of-bounds Write

[,5.0)
  • M
Out-of-Bounds

[,1.6.2]
  • M
Directory Traversal

[,2.7.0)
  • H
Out-of-Bounds

[,1.0)
  • M
NULL Pointer Dereference

[,2.6.0)
  • H
Out-of-Bounds

[,0.9.0]
  • M
Denial of Service (DoS)

[0,)
  • H
Out-of-Bounds

[,1.7.2)
  • M
Use After Free

[,2.7.0)
  • H
Release of Invalid Pointer or Reference

[,6.1.0)
  • M
Memory Leak

[,2.8.0)
  • H
Buffer Overflow

[,2.6.0)
  • M
Integer Overflow or Wraparound

[,2.8.0)
  • M
Denial of Service (DoS)

[5.0,5.0.1)
  • M
Denial of Service (DoS)

[,1.7.2)
  • M
Memory Leak

[,2.8.0)
  • M
Improper Input Validation

[,2.5.1)
  • H
Out-of-bounds Write

[,2.6.0)
  • L
Integer Overflow or Wraparound

[4.0.1,5.0)
  • M
Use After Free

[,2.1.3)
  • M
Out-of-Bounds

[,2.5.0)
  • M
Denial of Service (DoS)

[,2.8.0)
  • M
Denial of Service (DoS)

[,2.10.0)
  • H
Use After Free

[0,)
  • M
Denial of Service (DoS)

[,2.8.0)
  • M
Divide By Zero

[,2.9.0)
  • C
Integer Overflow or Wraparound

[,3.0.1)
  • M
Denial of Service (DoS)

[,3.1)
  • M
Denial of Service (DoS)

[,2.7.0)
  • M
Out-of-bounds Read

[,2.9.0)
  • C
Out-of-bounds Write

[,2.11)
  • M
Out-of-Bounds

[,5.1.0)
  • M
Out-of-Bounds

[,1.0)
  • M
Out-of-bounds Read

[,1.7.2)
  • H
Buffer Overflow

[,1.3.0)