Unrated severityNVD Advisory· Published Aug 8, 2008· Updated Apr 23, 2026
CVE-2008-1945
CVE-2008-1945
Description
QEMU 0.9.0 does not properly handle changes to removable media, which allows guest OS users to read arbitrary files on the host OS by using the diskformat: parameter in the -usbdevice option to modify the disk-image header to identify a different format, a related issue to CVE-2008-2004.
Affected products
16cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*+ 1 more
- cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:5.2:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:10:-:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:suse:linux_enterprise_server:10:-:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
- osv-coords2 versionspkg:rpm/opensuse/qemu&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/qemu-linux-user&distro=openSUSE%20Tumbleweed
< 2.6.1-1.5+ 1 more
- (no CPE)range: < 2.6.1-1.5
- (no CPE)range: < 2.6.1-1.5
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
14- lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.htmlnvdMailing ListThird Party Advisory
- secunia.com/advisories/32063nvdThird Party Advisory
- secunia.com/advisories/32088nvdThird Party Advisory
- secunia.com/advisories/34642nvdThird Party Advisory
- secunia.com/advisories/35031nvdThird Party Advisory
- secunia.com/advisories/35062nvdThird Party Advisory
- www.debian.org/security/2009/dsa-1799nvdThird Party Advisory
- www.mandriva.com/security/advisoriesnvdThird Party Advisory
- www.securityfocus.com/bid/30604nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/idnvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/usn-776-1nvdThird Party Advisory
- exchange.xforce.ibmcloud.com/vulnerabilities/44269nvdThird Party AdvisoryVDB Entry
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9905nvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2008-0892.htmlnvdThird Party Advisory
News mentions
0No linked articles in our index yet.