aboutsummaryrefslogtreecommitdiff
path: root/security/vuxml/vuln.xml
diff options
context:
space:
mode:
authorMartin Wilke <miwi@FreeBSD.org>2008-03-11 23:25:38 +0000
committerMartin Wilke <miwi@FreeBSD.org>2008-03-11 23:25:38 +0000
commit68f206fa2488011cf024427892b06e97ad567fa1 (patch)
tree4a670f1b97eb6d1210a4f666b709b0f49437a368 /security/vuxml/vuln.xml
parent710a65a0c477584b70cfd6dc68e65b503026a102 (diff)
downloadports-68f206fa2488011cf024427892b06e97ad567fa1.tar.gz
ports-68f206fa2488011cf024427892b06e97ad567fa1.zip
Notes
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r--security/vuxml/vuln.xml14
1 files changed, 8 insertions, 6 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 6274e5b89c81..a7c9544d4074 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -48,18 +48,20 @@ Note: Please add new entries to the beginning of this file.
<p>Ian Jackson reports on the debian-security mailinglist:</p>
<blockquote cite="http://lists.debian.org/debian-security/2008/02/msg00064.html">
<p>When a block device read or write request is made by the guest,
- nothing checks that the request is within the range supported by the
- backend, but the code in the backend typically assumes that the
- request is sensible.</p>
+ nothing checks that the request is within the range supported by
+ the backend, but the code in the backend typically assumes that
+ the request is sensible.</p>
<p>Depending on the backend, this can allow the guest to read
- and write arbitrary memory locations in qemu, and possibly gain
- control over the qemu process, escaping from the
- emulation/virtualisation.</p>
+ and write arbitrary memory locations in qemu, and possibly gain
+ control over the qemu process, escaping from the
+ emulation/virtualisation.</p>
</blockquote>
</body>
</description>
<references>
<cvename>CVE-2008-0928</cvename>
+ <url>http://secunia.com/advisories/29172</url>
+ <url>http://secunia.com/advisories/29172</url>
<mlist msgid="18362.62578.44273.779731@mariner.uk.xensource.com">http://lists.debian.org/debian-security/2008/02/msg00064.html</mlist>
</references>
<dates>