First published: Fri Apr 19 2019(Updated: )
hw/sparc64/sun4u.c in QEMU 3.1.50 is vulnerable to a NULL pointer dereference, which allows the attacker to cause a denial of service via a device driver.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u12 1:9.2.0+ds-2 1:9.2.0+ds-5 | |
QEMU KVM | =3.1.50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-5008 is a vulnerability in QEMU 3.1.50 that allows an attacker to cause a denial of service via a device driver.
The CVE-2019-5008 vulnerability can be exploited by triggering a NULL pointer dereference in the hw/sparc64/sun4u.c file of QEMU 3.1.50.
The severity of CVE-2019-5008 is not mentioned in the provided information.
To fix the CVE-2019-5008 vulnerability, update QEMU to version 2.0.0+dfsg-2ubuntu1.46 (for Ubuntu), 1:2.12+dfsg-3ubuntu8.7 (for Ubuntu), 1:3.1+dfsg-2ubuntu3.1 (for Ubuntu), 1:3.1+dfsg-8+deb10u8 or later (for Debian).
You can find more information about CVE-2019-5008 at the following references: http://www.securityfocus.com/bid/108024, https://fakhrizulkifli.github.io/posts/2019/01/03/CVE-2019-5008/, https://git.qemu.org/?p=qemu.git;a=history;f=hw/sparc64/sun4u.c;hb=HEAD