Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2013-1100

Опубликовано: 22 июл. 2013
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2013-1100: qemu-kvm security update (IMPORTANT)

[qemu-kvm-0.12.1.2-2.355.el6_4.6]

  • kvm-qga-cast-to-int-for-DWORD-type.patch [bz#980758]
  • kvm-qga-remove-undefined-behavior-in-ga_install_service.patch [bz#980758]
  • kvm-qga-diagnostic-output-should-go-to-stderr.patch [bz#980758]
  • kvm-qa_install_service-nest-error-paths-more-idiomatically.patch [bz#980758]
  • kvm-qga-escape-cmdline-args-when-registering-win32-service.patch [bz#980758]
  • Resolves: bz#980758 (qemu-kvm: CVE-2013-2231 qemu: qemu-ga win32 service unquoted search path [rhel-6.4.z])

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

qemu-guest-agent

0.12.1.2-2.355.el6_4.6

qemu-guest-agent-win32

0.12.1.2-2.355.el6_4.6

qemu-img

0.12.1.2-2.355.el6_4.6

qemu-kvm

0.12.1.2-2.355.el6_4.6

qemu-kvm-tools

0.12.1.2-2.355.el6_4.6

Oracle Linux i686

qemu-guest-agent

0.12.1.2-2.355.el6_4.6

Связанные CVE

Связанные уязвимости

redhat
около 12 лет назад

Unquoted Windows search path vulnerability in the QEMU Guest Agent service for Red Hat Enterprise Linux Desktop 6, HPC Node 6, Server 6, Workstation 6, Desktop Supplementary 6, Server Supplementary 6, Supplementary AUS 6.4, Supplementary EUS 6.4.z, and Workstation Supplementary 6, when installing on Windows, allows local users to gain privileges via a crafted program in an unspecified folder.

nvd
почти 12 лет назад

Unquoted Windows search path vulnerability in the QEMU Guest Agent service for Red Hat Enterprise Linux Desktop 6, HPC Node 6, Server 6, Workstation 6, Desktop Supplementary 6, Server Supplementary 6, Supplementary AUS 6.4, Supplementary EUS 6.4.z, and Workstation Supplementary 6, when installing on Windows, allows local users to gain privileges via a crafted program in an unspecified folder.

debian
почти 12 лет назад

Unquoted Windows search path vulnerability in the QEMU Guest Agent ser ...

github
больше 3 лет назад

Unquoted Windows search path vulnerability in the QEMU Guest Agent service for Red Hat Enterprise Linux Desktop 6, HPC Node 6, Server 6, Workstation 6, Desktop Supplementary 6, Server Supplementary 6, Supplementary AUS 6.4, Supplementary EUS 6.4.z, and Workstation Supplementary 6, when installing on Windows, allows local users to gain privileges via a crafted program in an unspecified folder.

fstec
около 12 лет назад

Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации