Out-of-Bounds Affecting qemu package, versions <0.9.1+svn20081101-1
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIANUNSTABLE-QEMU-427780
- published 29 Dec 2008
- disclosed 29 Dec 2008
Introduced: 29 Dec 2008
CVE-2008-4539 Open this link in a new tabHow to fix?
Upgrade Debian:unstable
qemu
to version 0.9.1+svn20081101-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream qemu
package and not the qemu
package as distributed by Debian
.
See How to fix?
for Debian:unstable
relevant fixed versions and status.
Heap-based buffer overflow in the Cirrus VGA implementation in (1) KVM before kvm-82 and (2) QEMU on Debian GNU/Linux and Ubuntu might allow local users to gain privileges by using the VNC console for a connection, aka the LGD-54XX "bitblt" heap overflow. NOTE: this issue exists because of an incorrect fix for CVE-2007-1320.
References
- https://security-tracker.debian.org/tracker/CVE-2008-4539
- http://www.debian.org/security/2009/dsa-1799
- http://git.kernel.dk/?p=qemu.git;a=commitdiff;h=65d35a09979e63541afc5bfc595b9f1b1b4ae069
- http://groups.google.com/group/linux.debian.changes.devel/msg/9e0dc008572f2867?dmode=source
- https://launchpad.net/ubuntu/jaunty/+source/qemu/0.9.1+svn20081112-1ubuntu1
- http://svn.savannah.gnu.org/viewvc/?view=rev&root=qemu&revision=5587
- https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01223.html
- http://www.mail-archive.com/cvs-all@freebsd.org/msg129730.html
- http://www.mail-archive.com/secure-testing-commits@lists.alioth.debian.org/msg09322.html
- http://xforce.iss.net/xforce/xfdb/47736
- http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html
- https://bugzilla.redhat.com/show_bug.cgi?id=237342
- https://bugzilla.redhat.com/show_bug.cgi?id=448525
- https://bugzilla.redhat.com/show_bug.cgi?id=466890
- http://secunia.com/advisories/25073
- http://secunia.com/advisories/29129
- http://secunia.com/advisories/33350
- http://secunia.com/advisories/34642
- http://secunia.com/advisories/35031
- http://secunia.com/advisories/35062
- http://www.ubuntu.com/usn/usn-776-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47736
- http://git.kernel.dk/?p=qemu.git%3Ba=commitdiff%3Bh=65d35a09979e63541afc5bfc595b9f1b1b4ae069
- http://www.mail-archive.com/cvs-all%40freebsd.org/msg129730.html
- http://www.mail-archive.com/secure-testing-commits%40lists.alioth.debian.org/msg09322.html