[Pkg-xen-devel] Bug#469654: xen-unstable: CVE-2008-0928 privilege escalation

Nico Golde nion at debian.org
Thu Mar 6 11:36:47 UTC 2008


Package: xen-unstable
Severity: grave
Tags: security patch

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for xen-unstable.

CVE-2008-0928[0]:
| Qemu 0.9.1 and earlier does not perform range checks for block device
| read or write requests, which allows guest host users with root
| privileges to access arbitrary memory and escape the virtual machine.

If you fix this vulnerability please also include the CVE id
in your changelog entry.

https://bugzilla.redhat.com/attachment.cgi?id=296005 is the 
patch (tools/ioemu/block.c should get patched).

For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0928

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - nion at jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : http://lists.alioth.debian.org/pipermail/pkg-xen-devel/attachments/20080306/d3128f1f/attachment.pgp 


More information about the Pkg-xen-devel mailing list