{"id":"CVE-2013-4540","details":"Buffer overflow in scoop_gpio_handler_update in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a large (1) prev_level, (2) gpio_level, or (3) gpio_dir value in a savevm image.","modified":"2026-04-16T06:15:52.364796724Z","published":"2014-11-04T21:55:24Z","related":["openSUSE-SU-2024:10196-1","openSUSE-SU-2024:10233-1"],"references":[{"type":"FIX","url":"http://lists.nongnu.org/archive/html/qemu-stable/2014-07/msg00187.html"},{"type":"WEB","url":"http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=52f91c3723932f8340fe36c8ec8b18a757c37b2b"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133345.html"},{"type":"WEB","url":"http://lists.gnu.org/archive/html/qemu-devel/2013-12/msg00394.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html"}],"schema_version":"1.7.5"}