Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2012-1234

Опубликовано: 05 сент. 2012
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2012-1234: qemu-kvm security update (IMPORTANT)

[0.12.1.2-2.295.el6_3.2]

  • kvm-console-bounds-check-whenever-changing-the-cursor-du.patch [bz#851257
  • Resolves: bz#851257 (EMBARGOED CVE-2012-3515 qemu/kvm: VT100 emulation vulnerability [rhel-6.3.z])

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

qemu-guest-agent

0.12.1.2-2.295.el6_3.2

qemu-img

0.12.1.2-2.295.el6_3.2

qemu-kvm

0.12.1.2-2.295.el6_3.2

qemu-kvm-tools

0.12.1.2-2.295.el6_3.2

Связанные CVE

Связанные уязвимости

ubuntu
больше 12 лет назад

Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."

redhat
почти 13 лет назад

Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."

nvd
больше 12 лет назад

Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."

debian
больше 12 лет назад

Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulat ...

github
больше 3 лет назад

Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."