FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

qemu -- unchecked block read/write vulnerability

Affected packages
qemu < 0.9.1_2
qemu-devel < 0.9.1_2


VuXML ID 9cfbca7f-efb7-11dc-be01-0211060005df
Discovery 2008-02-19
Entry 2008-03-11

Ian Jackson reports on the debian-security mailinglist:

When a block device read or write request is made by the guest, nothing checks that the request is within the range supported by the backend, but the code in the backend typically assumes that the request is sensible.

Depending on the backend, this can allow the guest to read and write arbitrary memory locations in qemu, and possibly gain control over the qemu process, escaping from the emulation/virtualisation.


CVE Name CVE-2008-0928