{"id":"CVE-2013-4542","details":"The virtio_scsi_load_request function in hw/scsi/scsi-bus.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted savevm image, which triggers an out-of-bounds array access.","modified":"2026-02-05T03:48:46.895980Z","published":"2014-11-04T21:55:25Z","related":["MGASA-2014-0426","openSUSE-SU-2024:10233-1"],"references":[{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2014-0743.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2014-0744.html"},{"type":"FIX","url":"http://lists.nongnu.org/archive/html/qemu-stable/2014-07/msg00187.html"},{"type":"FIX","url":"http://rhn.redhat.com/errata/RHSA-2014-0743.html"},{"type":"FIX","url":"http://rhn.redhat.com/errata/RHSA-2014-0744.html"},{"type":"WEB","url":"http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=3c3ce981423e0d6c18af82ee62f1850c2cda5976"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133345.html"}],"schema_version":"1.7.3"}