Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2012-1235

Опубликовано: 05 сент. 2012
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2012-1235: kvm security update (IMPORTANT)

[83-249.0.1.el5_8.5]

  • Added kvm-add-oracle-workaround-for-libvirt-bug.patch
  • Added kvm-Introduce-oel-machine-type.patch

[83-249.el5_8.5]

  • kvm-console-bounds-check-whenever-changing-the-cursor-du-58.patch [bz#851255]
  • CVE: CVE-2012-3515
  • Resolves: bz#851255 (EMBARGOED CVE-2012-3515 qemu/kvm: VT100 emulation vulnerability [rhel-5.8.z])

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

kmod-kvm

83-249.0.1.el5_8.5

kmod-kvm-debug

83-249.0.1.el5_8.5

kvm

83-249.0.1.el5_8.5

kvm-qemu-img

83-249.0.1.el5_8.5

kvm-tools

83-249.0.1.el5_8.5

Связанные CVE

Связанные уязвимости

ubuntu
больше 12 лет назад

Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."

redhat
почти 13 лет назад

Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."

nvd
больше 12 лет назад

Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."

debian
больше 12 лет назад

Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulat ...

github
больше 3 лет назад

Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."