Index: vuln.xml =================================================================== RCS file: /home/pcvs/ports/security/vuxml/vuln.xml,v retrieving revision 1.1578 diff -u -p -r1.1578 vuln.xml --- vuln.xml 10 Mar 2008 10:41:23 -0000 1.1578 +++ vuln.xml 11 Mar 2008 22:40:26 -0000 @@ -34,6 +34,40 @@ Note: Please add new entries to the beg --> + + qemu -- unchecked block read/write vulnerability + + + qemu + qemu-devel + 0.9.1_2 + + + + +

Ian Jackson reports on the debian-security mailinglist:

+
+

When a block device read or write request is made by the guest, + nothing checks that the request is within the range supported by the + backend, but the code in the backend typically assumes that the + request is sensible.

+

Depending on the backend, this can allow the guest to read + and write arbitrary memory locations in qemu, and possibly gain + control over the qemu process, escaping from the + emulation/virtualisation.

+
+ +
+ + CVE-2008-0928 + http://lists.debian.org/debian-security/2008/02/msg00064.html + + + 2008-02-19 + 2008-03-11 + +
+ dovecot -- security hole in blocking passdbs