Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2010-0430

Опубликовано: 30 мар. 2010
Источник: redhat
CVSS2: 6.6

Описание

libspice, as used in QEMU-KVM in Red Hat Enterprise Virtualization Hypervisor (aka RHEV-H or rhev-hypervisor) before 5.5-2.2 and possibly other products, allows guest OS users to read from or write to arbitrary QEMU memory by modifying the address that is used by Cairo for memory mappings.

Отчет

The CVE-2010-0430 issue was fixed in the kvm packages for Red Hat Enterprise Linux 5 via RHSA-2010:0271, and fixed in the rhev-hypervisor package via RHSA-2010:0476. This CVE was not disclosed at the time the errata were released; therefore, it was not mentioned in them.

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=568702libspice: Insufficient guest provided memory mappings boundaries validations

6.6 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 12 лет назад

libspice, as used in QEMU-KVM in Red Hat Enterprise Virtualization Hypervisor (aka RHEV-H or rhev-hypervisor) before 5.5-2.2 and possibly other products, allows guest OS users to read from or write to arbitrary QEMU memory by modifying the address that is used by Cairo for memory mappings.

nvd
почти 12 лет назад

libspice, as used in QEMU-KVM in Red Hat Enterprise Virtualization Hypervisor (aka RHEV-H or rhev-hypervisor) before 5.5-2.2 and possibly other products, allows guest OS users to read from or write to arbitrary QEMU memory by modifying the address that is used by Cairo for memory mappings.

debian
почти 12 лет назад

libspice, as used in QEMU-KVM in Red Hat Enterprise Virtualization Hyp ...

github
больше 3 лет назад

libspice, as used in QEMU-KVM in Red Hat Enterprise Virtualization Hypervisor (aka RHEV-H or rhev-hypervisor) before 5.5-2.2 and possibly other products, allows guest OS users to read from or write to arbitrary QEMU memory by modifying the address that is used by Cairo for memory mappings.

oracle-oval
больше 15 лет назад

ELSA-2010-0271: kvm security, bug fix and enhancement update (IMPORTANT)

6.6 Medium

CVSS2