CVE Vulnerabilities

CVE-2008-0928

Published: Mar 03, 2008 | Modified: Apr 09, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
4.7 MEDIUM
AV:L/AC:M/Au:N/C:C/I:N/A:N
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Qemu 0.9.1 and earlier does not perform range checks for block device read or write requests, which allows guest host users with root privileges to access arbitrary memory and escape the virtual machine.

Affected Software

NameVendorStart VersionEnd Version
QemuQemu0.1.0 (including)0.1.0 (including)
QemuQemu0.1.1 (including)0.1.1 (including)
QemuQemu0.1.2 (including)0.1.2 (including)
QemuQemu0.1.3 (including)0.1.3 (including)
QemuQemu0.1.4 (including)0.1.4 (including)
QemuQemu0.1.5 (including)0.1.5 (including)
QemuQemu0.1.6 (including)0.1.6 (including)
QemuQemu0.2.0 (including)0.2.0 (including)
QemuQemu0.3.0 (including)0.3.0 (including)
QemuQemu0.4.0 (including)0.4.0 (including)
QemuQemu0.4.1 (including)0.4.1 (including)
QemuQemu0.4.2 (including)0.4.2 (including)
QemuQemu0.4.3 (including)0.4.3 (including)
QemuQemu0.5.0 (including)0.5.0 (including)
QemuQemu0.5.1 (including)0.5.1 (including)
QemuQemu0.5.2 (including)0.5.2 (including)
QemuQemu0.5.3 (including)0.5.3 (including)
QemuQemu0.5.4 (including)0.5.4 (including)
QemuQemu0.5.5 (including)0.5.5 (including)
QemuQemu0.6.0 (including)0.6.0 (including)
QemuQemu0.6.1 (including)0.6.1 (including)
QemuQemu0.7.0 (including)0.7.0 (including)
QemuQemu0.7.1 (including)0.7.1 (including)
QemuQemu0.7.2 (including)0.7.2 (including)
QemuQemu0.8.0 (including)0.8.0 (including)
QemuQemu0.8.1 (including)0.8.1 (including)
QemuQemu0.8.2 (including)0.8.2 (including)
QemuQemu0.9.0 (including)0.9.0 (including)
QemuQemu0.9.1 (including)0.9.1 (including)
Red Hat Enterprise Linux 5RedHatxen-0:3.0.3-41.el5_1.5*
KvmUbuntufeisty*
KvmUbuntugutsy*
KvmUbuntuhardy*
KvmUbuntuupstream*
QemuUbuntudapper*
QemuUbuntuedgy*
QemuUbuntufeisty*
QemuUbuntugutsy*
QemuUbuntuhardy*
QemuUbuntuupstream*
Xen-3.0Ubuntuedgy*
Xen-3.0Ubuntufeisty*
Xen-3.1Ubuntugutsy*
Xen-3.1Ubuntuhardy*
Xen-3.1Ubuntuintrepid*
Xen-3.2Ubuntuhardy*
Xen-3.2Ubuntuupstream*

References