Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2012-1236

Опубликовано: 05 сент. 2012
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2012-1236: xen security update (IMPORTANT)

[3.0.3-135.el5_8.5]

  • console: Prevent escape sequence length overflow (rhbz 851253)

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

xen

3.0.3-135.el5_8.5

xen-devel

3.0.3-135.el5_8.5

xen-libs

3.0.3-135.el5_8.5

Oracle Linux x86_64

xen

3.0.3-135.el5_8.5

xen-devel

3.0.3-135.el5_8.5

xen-libs

3.0.3-135.el5_8.5

Oracle Linux i386

xen

3.0.3-135.el5_8.5

xen-devel

3.0.3-135.el5_8.5

xen-libs

3.0.3-135.el5_8.5

Связанные CVE

Связанные уязвимости

ubuntu
больше 12 лет назад

Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."

redhat
почти 13 лет назад

Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."

nvd
больше 12 лет назад

Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."

debian
больше 12 лет назад

Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulat ...

github
больше 3 лет назад

Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."