mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
138 lines
5.3 KiB
JSON
138 lines
5.3 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2011-1750",
|
|
"ASSIGNER": "secalert@redhat.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Multiple heap-based buffer overflows in the virtio-blk driver (hw/virtio-blk.c) in qemu-kvm 0.14.0 allow local guest users to cause a denial of service (guest crash) and possibly gain privileges via a (1) write request to the virtio_blk_handle_write function or (2) read request to the virtio_blk_handle_read function that is not properly aligned."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "n/a",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "http://git.kernel.org/?p=virt/kvm/qemu-kvm.git%3Ba=commitdiff%3Bh=52c050236eaa4f0b5e1d160cd66dc18106445c4d",
|
|
"refsource": "MISC",
|
|
"name": "http://git.kernel.org/?p=virt/kvm/qemu-kvm.git%3Ba=commitdiff%3Bh=52c050236eaa4f0b5e1d160cd66dc18106445c4d"
|
|
},
|
|
{
|
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081972.html",
|
|
"refsource": "MISC",
|
|
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081972.html"
|
|
},
|
|
{
|
|
"url": "http://lists.gnu.org/archive/html/qemu-devel/2011-03/msg03015.html",
|
|
"refsource": "MISC",
|
|
"name": "http://lists.gnu.org/archive/html/qemu-devel/2011-03/msg03015.html"
|
|
},
|
|
{
|
|
"url": "http://lists.gnu.org/archive/html/qemu-devel/2011-03/msg03019.html",
|
|
"refsource": "MISC",
|
|
"name": "http://lists.gnu.org/archive/html/qemu-devel/2011-03/msg03019.html"
|
|
},
|
|
{
|
|
"url": "http://lists.opensuse.org/opensuse-updates/2011-05/msg00043.html",
|
|
"refsource": "MISC",
|
|
"name": "http://lists.opensuse.org/opensuse-updates/2011-05/msg00043.html"
|
|
},
|
|
{
|
|
"url": "http://rhn.redhat.com/errata/RHSA-2011-0534.html",
|
|
"refsource": "MISC",
|
|
"name": "http://rhn.redhat.com/errata/RHSA-2011-0534.html"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/44132",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/44132"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/44393",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/44393"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/44658",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/44658"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/44660",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/44660"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/44900",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/44900"
|
|
},
|
|
{
|
|
"url": "http://www.osvdb.org/73756",
|
|
"refsource": "MISC",
|
|
"name": "http://www.osvdb.org/73756"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67062",
|
|
"refsource": "MISC",
|
|
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67062"
|
|
},
|
|
{
|
|
"url": "https://hermes.opensuse.org/messages/8572547",
|
|
"refsource": "MISC",
|
|
"name": "https://hermes.opensuse.org/messages/8572547"
|
|
},
|
|
{
|
|
"url": "https://www.debian.org/security/2011/dsa-2230",
|
|
"refsource": "MISC",
|
|
"name": "https://www.debian.org/security/2011/dsa-2230"
|
|
},
|
|
{
|
|
"url": "https://www.ubuntu.com/usn/USN-1145-1/",
|
|
"refsource": "MISC",
|
|
"name": "https://www.ubuntu.com/usn/USN-1145-1/"
|
|
}
|
|
]
|
|
}
|
|
} |