FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

qemu -- unchecked block read/write vulnerability

Affected packages
qemu < 0.9.1_2
qemu-devel < 0.9.1_2

Details

VuXML ID 9cfbca7f-efb7-11dc-be01-0211060005df
Discovery 2008-02-19
Entry 2008-03-11

Ian Jackson reports on the debian-security mailinglist:

When a block device read or write request is made by the guest, nothing checks that the request is within the range supported by the backend, but the code in the backend typically assumes that the request is sensible.

Depending on the backend, this can allow the guest to read and write arbitrary memory locations in qemu, and possibly gain control over the qemu process, escaping from the emulation/virtualisation.

References

CVE Name CVE-2008-0928
Message 18362.62578.44273.779731@mariner.uk.xensource.com
URL http://secunia.com/advisories/29081
URL http://secunia.com/advisories/29172