Bug 448525 - CVE-2007-1320 xen/qemu Cirrus LGD-54XX "bitblt" Heap Overflow [Fedora 9]
Summary: CVE-2007-1320 xen/qemu Cirrus LGD-54XX "bitblt" Heap Overflow [Fedora 9]
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: Fedora
Classification: Fedora
Component: kvm
Version: 9
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Glauber Costa
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: impact=important,source=vendorsec,rep...
Depends On:
Blocks: CVE-2007-1320
TreeView+ depends on / blocked
 
Reported: 2008-05-27 13:12 UTC by Glauber Costa
Modified: 2008-12-02 16:18 UTC (History)
7 users (show)

Fixed In Version: 65-7.fc9
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2008-12-02 16:18:40 UTC
Type: ---


Attachments (Terms of Use)

Comment 1 Fedora Update System 2008-05-29 02:33:10 UTC
kvm-65-7.fc9 has been pushed to the Fedora 9 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 2 Glauber Costa 2008-11-11 15:47:10 UTC
It appears this beast is still alive.
CVE-2008-4539 is its new name.

Comment 3 Fedora Update System 2008-11-11 16:06:37 UTC
kvm-65-11.fc9 has been submitted as an update for Fedora 9.
http://admin.fedoraproject.org/updates/kvm-65-11.fc9

Comment 4 Fedora Update System 2008-11-12 02:55:58 UTC
kvm-65-11.fc9 has been pushed to the Fedora 9 testing repository.  If problems still persist, please make note of it in this bug report.
 If you want to test the update, you can install it with 
 su -c 'yum --enablerepo=updates-testing update kvm'.  You can provide feedback for this update here: http://admin.fedoraproject.org/updates/F9/FEDORA-2008-9571

Comment 5 Fedora Update System 2008-12-02 15:54:31 UTC
kvm-65-13.fc9 has been submitted as an update for Fedora 9.
http://admin.fedoraproject.org/updates/kvm-65-13.fc9

Comment 6 Tomas Hoger 2008-12-02 16:18:40 UTC
This should be dead and closed, security regression in the original fix should be handled as separate issue.


Note You need to log in before you can comment on or make changes to this bug.