Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2008-0928

Опубликовано: 03 мар. 2008
Источник: debian
EPSS Низкий

Описание

Qemu 0.9.1 and earlier does not perform range checks for block device read or write requests, which allows guest host users with root privileges to access arbitrary memory and escape the virtual machine.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemufixed0.9.1+svn20081207-1package
xen-unstablefixed3.2.0-4package
xen-3fixed3.2.0-4package
xen-3.0removedpackage
kvmfixed63+dfsg-1package

EPSS

Процентиль: 25%
0.00082
Низкий

Связанные уязвимости

ubuntu
больше 17 лет назад

Qemu 0.9.1 and earlier does not perform range checks for block device read or write requests, which allows guest host users with root privileges to access arbitrary memory and escape the virtual machine.

redhat
больше 17 лет назад

Qemu 0.9.1 and earlier does not perform range checks for block device read or write requests, which allows guest host users with root privileges to access arbitrary memory and escape the virtual machine.

nvd
больше 17 лет назад

Qemu 0.9.1 and earlier does not perform range checks for block device read or write requests, which allows guest host users with root privileges to access arbitrary memory and escape the virtual machine.

github
около 3 лет назад

Qemu 0.9.1 and earlier does not perform range checks for block device read or write requests, which allows guest host users with root privileges to access arbitrary memory and escape the virtual machine.

oracle-oval
около 17 лет назад

ELSA-2008-0194: xen security and bug fix update (IMPORTANT)

EPSS

Процентиль: 25%
0.00082
Низкий