Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2012-3515
Vulnerability from cvelistv5
Published
2012-11-23 20:00
Modified
2024-08-06 20:05
Severity ?
EPSS score ?
Summary
Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:05:12.755Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "55082", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/55082" }, { "name": "50528", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/50528" }, { "name": "RHSA-2012:1234", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1234.html" }, { "name": "50530", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/50530" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.qemu.org/?p=qemu-stable-0.15.git%3Ba=log" }, { "name": "51413", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/51413" }, { "name": "GLSA-201309-24", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201309-24.xml" }, { "name": "50689", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/50689" }, { "name": "DSA-2543", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2543" }, { "name": "SUSE-SU-2012:1135", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00005.html" }, { "name": "50632", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/50632" }, { "name": "RHSA-2012:1325", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1325.html" }, { "name": "RHSA-2012:1236", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1236.html" }, { "name": "SUSE-SU-2012:1205", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00027.html" }, { "name": "SUSE-SU-2012:1202", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00024.html" }, { "name": "50913", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/50913" }, { "name": "openSUSE-SU-2012:1572", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" }, { "name": "50472", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/50472" }, { "name": "openSUSE-SU-2012:1170", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00016.html" }, { "name": "USN-1590-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1590-1" }, { "name": "RHSA-2012:1262", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1262.html" }, { "name": "openSUSE-SU-2012:1153", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2012-09/msg00051.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.xen.org/wiki/Security_Announcements#XSA-17_Qemu_VT100_emulation_vulnerability" }, { "name": "SUSE-SU-2012:1203", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00026.html" }, { "name": "55413", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/55413" }, { "name": "SUSE-SU-2012:1162", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00012.html" }, { "name": "openSUSE-SU-2012:1174", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html" }, { "name": "SUSE-SU-2012:1320", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00002.html" }, { "name": "GLSA-201604-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201604-03" }, { "name": "RHSA-2012:1233", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1233.html" }, { "name": "SUSE-SU-2012:1132", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.citrix.com/article/CTX134708" }, { "name": "DSA-2545", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2545" }, { "name": "SUSE-SU-2012:1129", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00001.html" }, { "name": "[Xen-announce] 20120905 Xen Security Advisory 17 (CVE-2012-3515) - Qemu VT100 emulation vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.xen.org/archives/html/xen-announce/2012-09/msg00003.html" }, { "name": "SUSE-SU-2012:1133", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html" }, { "name": "RHSA-2012:1235", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1235.html" }, { "name": "openSUSE-SU-2012:1573", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" }, { "name": "[oss-security] 20120905 Xen Security Advisory 17 (CVE-2012-3515) - Qemu VT100 emulation vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/09/05/10" }, { "name": "openSUSE-SU-2012:1172", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html" }, { "name": "50860", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/50860" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-09-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a \"device model\u0027s address space.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-06-30T16:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "55082", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/55082" }, { "name": "50528", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/50528" }, { "name": "RHSA-2012:1234", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1234.html" }, { "name": "50530", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/50530" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.qemu.org/?p=qemu-stable-0.15.git%3Ba=log" }, { "name": "51413", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/51413" }, { "name": "GLSA-201309-24", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201309-24.xml" }, { "name": "50689", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/50689" }, { "name": "DSA-2543", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2543" }, { "name": "SUSE-SU-2012:1135", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00005.html" }, { "name": "50632", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/50632" }, { "name": "RHSA-2012:1325", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1325.html" }, { "name": "RHSA-2012:1236", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1236.html" }, { "name": "SUSE-SU-2012:1205", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00027.html" }, { "name": "SUSE-SU-2012:1202", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00024.html" }, { "name": "50913", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/50913" }, { "name": "openSUSE-SU-2012:1572", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" }, { "name": "50472", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/50472" }, { "name": "openSUSE-SU-2012:1170", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00016.html" }, { "name": "USN-1590-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1590-1" }, { "name": "RHSA-2012:1262", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1262.html" }, { "name": "openSUSE-SU-2012:1153", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2012-09/msg00051.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.xen.org/wiki/Security_Announcements#XSA-17_Qemu_VT100_emulation_vulnerability" }, { "name": "SUSE-SU-2012:1203", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00026.html" }, { "name": "55413", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/55413" }, { "name": "SUSE-SU-2012:1162", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00012.html" }, { "name": "openSUSE-SU-2012:1174", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html" }, { "name": "SUSE-SU-2012:1320", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00002.html" }, { "name": "GLSA-201604-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201604-03" }, { "name": "RHSA-2012:1233", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1233.html" }, { "name": "SUSE-SU-2012:1132", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.citrix.com/article/CTX134708" }, { "name": "DSA-2545", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2545" }, { "name": "SUSE-SU-2012:1129", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00001.html" }, { "name": "[Xen-announce] 20120905 Xen Security Advisory 17 (CVE-2012-3515) - Qemu VT100 emulation vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.xen.org/archives/html/xen-announce/2012-09/msg00003.html" }, { "name": "SUSE-SU-2012:1133", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html" }, { "name": "RHSA-2012:1235", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1235.html" }, { "name": "openSUSE-SU-2012:1573", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" }, { "name": "[oss-security] 20120905 Xen Security Advisory 17 (CVE-2012-3515) - Qemu VT100 emulation vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/09/05/10" }, { "name": "openSUSE-SU-2012:1172", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html" }, { "name": "50860", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/50860" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-3515", "datePublished": "2012-11-23T20:00:00", "dateReserved": "2012-06-14T00:00:00", "dateUpdated": "2024-08-06T20:05:12.755Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.2.0\", \"matchCriteriaId\": \"03FB8819-CA76-4C31-A901-6ACCB8325928\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"550223A9-B9F1-440A-8C25-9F0F76AF7301\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D532B60-C8DD-4A2F-9D05-E574D23EB754\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE554781-1EB9-446E-911F-6C11970C47F4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EBB2C482-D2A4-48B3-ACE7-E1DFDCC409B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D806A17E-B8F9-466D-807D-3F1E77603DC8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*\", \"matchCriteriaId\": \"F0545634-EC4A-48E8-AB3D-49802FB11758\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*\", \"matchCriteriaId\": \"00720D8C-3FF3-4B1C-B74B-91F01A544399\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*\", \"matchCriteriaId\": \"22A79A35-05DB-4B9F-AD3E-EA6F933CF10C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:ltss:*:*:*\", \"matchCriteriaId\": \"CED02712-1031-4206-AC4D-E68710F46EC9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*\", \"matchCriteriaId\": \"A53FF936-C785-4CEF-BAD0-3C3EB90EE466\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*\", \"matchCriteriaId\": \"67960FB9-13D1-4DEE-8158-31BF31BCBE6F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*\", \"matchCriteriaId\": \"88D6E858-FD8F-4C55-B7D5-CEEDA2BBA898\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*\", \"matchCriteriaId\": \"DB4D6749-81A1-41D7-BF4F-1C45A7F49A22\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*\", \"matchCriteriaId\": \"436EF2ED-FDBB-4B64-8EC4-33C3E4253F06\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*\", \"matchCriteriaId\": \"5AA37837-3083-4DC7-94F4-54FD5D7CB53C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D86166F9-BBF0-4650-8CCD-0F9C97104D21\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:virtualization:5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FCFEF451-4B77-4259-8000-B252E699A950\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:virtualization:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"37BA55FC-D350-4DEB-9802-40AF59C99E79\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"133AAFA7-AF42-4D7B-8822-AA2E85611BF5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8382A145-CDD9-437E-9DE7-A349956778B3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"54D669D4-6D7E-449D-80C1-28FA44F06FFE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BBCD86A-E6C7-4444-9D74-F861084090F0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0AC5CD5-6E58-433C-9EB3-6DFE5656463E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"036E8A89-7A16-411F-9D31-676313BB7244\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16F59A04-14CF-49E2-9973-645477EA09DA\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*\", \"matchCriteriaId\": \"01EDA41C-6B2E-49AF-B503-EB3882265C11\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF49D26F-142E-468B-87C1-BABEA445255C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4174F4F-149E-41A6-BBCC-D01114C05F38\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*\", \"matchCriteriaId\": \"8D305F7A-D159-4716-AB26-5E38BB5CD991\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a \\\"device model\u0027s address space.\\\"\"}, {\"lang\": \"es\", \"value\": \"Qemu, tal como se utiliza en Xen v4.0, v4.1 y posiblemente otros productos, al emular ciertos dispositivos con una consola virtual, permite a los usuarios locales del SO invitado obtener privilegios a trav\\u00e9s de una secuencia VT100 de escape manipulada que desencadena la sobrescritura del espacio de direcciones de un \\\"device model\u0027s address space.\\\"\"}]", "id": "CVE-2012-3515", "lastModified": "2024-11-21T01:41:02.263", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 7.2, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 3.9, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2012-11-23T20:55:03.523", "references": "[{\"url\": \"http://git.qemu.org/?p=qemu-stable-0.15.git%3Ba=log\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00001.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00005.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00012.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00016.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00024.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00026.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00027.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00002.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2012-09/msg00051.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.xen.org/archives/html/xen-announce/2012-09/msg00003.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2012-1233.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2012-1234.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2012-1235.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2012-1236.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2012-1262.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2012-1325.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/50472\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/50528\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/50530\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/50632\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/50689\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/50860\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/50913\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/51413\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/55082\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://security.gentoo.org/glsa/glsa-201309-24.xml\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://support.citrix.com/article/CTX134708\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://wiki.xen.org/wiki/Security_Announcements#XSA-17_Qemu_VT100_emulation_vulnerability\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.debian.org/security/2012/dsa-2543\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.debian.org/security/2012/dsa-2545\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2012/09/05/10\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Mitigation\", \"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/55413\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-1590-1\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/201604-03\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://git.qemu.org/?p=qemu-stable-0.15.git%3Ba=log\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00001.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00005.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00012.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00016.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00024.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00026.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00027.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00002.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2012-09/msg00051.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.xen.org/archives/html/xen-announce/2012-09/msg00003.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2012-1233.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2012-1234.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2012-1235.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2012-1236.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2012-1262.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2012-1325.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/50472\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/50528\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/50530\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/50632\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/50689\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/50860\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/50913\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/51413\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/55082\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://security.gentoo.org/glsa/glsa-201309-24.xml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://support.citrix.com/article/CTX134708\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://wiki.xen.org/wiki/Security_Announcements#XSA-17_Qemu_VT100_emulation_vulnerability\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.debian.org/security/2012/dsa-2543\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.debian.org/security/2012/dsa-2545\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2012/09/05/10\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Mitigation\", \"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/55413\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-1590-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/201604-03\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]", "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2012-3515\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2012-11-23T20:55:03.523\",\"lastModified\":\"2024-11-21T01:41:02.263\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a \\\"device model\u0027s address space.\\\"\"},{\"lang\":\"es\",\"value\":\"Qemu, tal como se utiliza en Xen v4.0, v4.1 y posiblemente otros productos, al emular ciertos dispositivos con una consola virtual, permite a los usuarios locales del SO invitado obtener privilegios a trav\u00e9s de una secuencia VT100 de escape manipulada que desencadena la sobrescritura del espacio de direcciones de un \\\"device model\u0027s address space.\\\"\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.2.0\",\"matchCriteriaId\":\"03FB8819-CA76-4C31-A901-6ACCB8325928\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"550223A9-B9F1-440A-8C25-9F0F76AF7301\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D532B60-C8DD-4A2F-9D05-E574D23EB754\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE554781-1EB9-446E-911F-6C11970C47F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBB2C482-D2A4-48B3-ACE7-E1DFDCC409B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D806A17E-B8F9-466D-807D-3F1E77603DC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0545634-EC4A-48E8-AB3D-49802FB11758\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"00720D8C-3FF3-4B1C-B74B-91F01A544399\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"22A79A35-05DB-4B9F-AD3E-EA6F933CF10C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:ltss:*:*:*\",\"matchCriteriaId\":\"CED02712-1031-4206-AC4D-E68710F46EC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*\",\"matchCriteriaId\":\"A53FF936-C785-4CEF-BAD0-3C3EB90EE466\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*\",\"matchCriteriaId\":\"67960FB9-13D1-4DEE-8158-31BF31BCBE6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*\",\"matchCriteriaId\":\"88D6E858-FD8F-4C55-B7D5-CEEDA2BBA898\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*\",\"matchCriteriaId\":\"DB4D6749-81A1-41D7-BF4F-1C45A7F49A22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*\",\"matchCriteriaId\":\"436EF2ED-FDBB-4B64-8EC4-33C3E4253F06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AA37837-3083-4DC7-94F4-54FD5D7CB53C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D86166F9-BBF0-4650-8CCD-0F9C97104D21\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:virtualization:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCFEF451-4B77-4259-8000-B252E699A950\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:virtualization:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37BA55FC-D350-4DEB-9802-40AF59C99E79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"133AAFA7-AF42-4D7B-8822-AA2E85611BF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8382A145-CDD9-437E-9DE7-A349956778B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54D669D4-6D7E-449D-80C1-28FA44F06FFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BBCD86A-E6C7-4444-9D74-F861084090F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0AC5CD5-6E58-433C-9EB3-6DFE5656463E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"036E8A89-7A16-411F-9D31-676313BB7244\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*\",\"matchCriteriaId\":\"01EDA41C-6B2E-49AF-B503-EB3882265C11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF49D26F-142E-468B-87C1-BABEA445255C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4174F4F-149E-41A6-BBCC-D01114C05F38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"8D305F7A-D159-4716-AB26-5E38BB5CD991\"}]}]}],\"references\":[{\"url\":\"http://git.qemu.org/?p=qemu-stable-0.15.git%3Ba=log\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00001.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00005.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00012.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00016.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00024.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00026.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00027.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00002.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2012-09/msg00051.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.xen.org/archives/html/xen-announce/2012-09/msg00003.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1233.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1234.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1235.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1236.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1262.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1325.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/50472\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/50528\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/50530\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/50632\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/50689\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/50860\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/50913\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/51413\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/55082\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-201309-24.xml\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.citrix.com/article/CTX134708\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://wiki.xen.org/wiki/Security_Announcements#XSA-17_Qemu_VT100_emulation_vulnerability\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2012/dsa-2543\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2012/dsa-2545\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/09/05/10\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/55413\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-1590-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201604-03\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://git.qemu.org/?p=qemu-stable-0.15.git%3Ba=log\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00005.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00012.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00016.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00024.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00026.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00027.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2012-09/msg00051.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.xen.org/archives/html/xen-announce/2012-09/msg00003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1233.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1234.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1235.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1236.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1262.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1325.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/50472\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/50528\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/50530\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/50632\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/50689\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/50860\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/50913\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/51413\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/55082\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-201309-24.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.citrix.com/article/CTX134708\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://wiki.xen.org/wiki/Security_Announcements#XSA-17_Qemu_VT100_emulation_vulnerability\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2012/dsa-2543\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2012/dsa-2545\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/09/05/10\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/55413\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-1590-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201604-03\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
gsd-2012-3515
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."
Aliases
Aliases
{ "GSD": { "alias": "CVE-2012-3515", "description": "Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a \"device model\u0027s address space.\"", "id": "GSD-2012-3515", "references": [ "https://www.suse.com/security/cve/CVE-2012-3515.html", "https://www.debian.org/security/2012/dsa-2545", "https://www.debian.org/security/2012/dsa-2543", "https://www.debian.org/security/2012/dsa-2542", "https://access.redhat.com/errata/RHSA-2012:1325", "https://access.redhat.com/errata/RHSA-2012:1262", "https://access.redhat.com/errata/RHSA-2012:1236", "https://access.redhat.com/errata/RHSA-2012:1235", "https://access.redhat.com/errata/RHSA-2012:1234", "https://access.redhat.com/errata/RHSA-2012:1233", "https://linux.oracle.com/cve/CVE-2012-3515.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2012-3515" ], "details": "Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a \"device model\u0027s address space.\"", "id": "GSD-2012-3515", "modified": "2023-12-13T01:20:20.347062Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-3515", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a \"device model\u0027s address space.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html" }, { "name": "http://secunia.com/advisories/55082", "refsource": "MISC", "url": "http://secunia.com/advisories/55082" }, { "name": "http://security.gentoo.org/glsa/glsa-201309-24.xml", "refsource": "MISC", "url": "http://security.gentoo.org/glsa/glsa-201309-24.xml" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00001.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00001.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00005.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00005.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00012.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00012.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" }, { "name": "http://secunia.com/advisories/50472", "refsource": "MISC", "url": "http://secunia.com/advisories/50472" }, { "name": "http://secunia.com/advisories/50530", "refsource": "MISC", "url": "http://secunia.com/advisories/50530" }, { "name": "http://secunia.com/advisories/51413", "refsource": "MISC", "url": "http://secunia.com/advisories/51413" }, { "name": "http://support.citrix.com/article/CTX134708", "refsource": "MISC", "url": "http://support.citrix.com/article/CTX134708" }, { "name": "https://security.gentoo.org/glsa/201604-03", "refsource": "MISC", "url": "https://security.gentoo.org/glsa/201604-03" }, { "name": "http://git.qemu.org/?p=qemu-stable-0.15.git%3Ba=log", "refsource": "MISC", "url": "http://git.qemu.org/?p=qemu-stable-0.15.git%3Ba=log" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00016.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00016.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00024.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00024.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00026.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00026.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00027.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00027.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00002.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00002.html" }, { "name": "http://lists.opensuse.org/opensuse-updates/2012-09/msg00051.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-updates/2012-09/msg00051.html" }, { "name": "http://lists.xen.org/archives/html/xen-announce/2012-09/msg00003.html", "refsource": "MISC", "url": "http://lists.xen.org/archives/html/xen-announce/2012-09/msg00003.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2012-1233.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2012-1233.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2012-1234.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2012-1234.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2012-1235.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2012-1235.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2012-1236.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2012-1236.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2012-1262.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2012-1262.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2012-1325.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2012-1325.html" }, { "name": "http://secunia.com/advisories/50528", "refsource": "MISC", "url": "http://secunia.com/advisories/50528" }, { "name": "http://secunia.com/advisories/50632", "refsource": "MISC", "url": "http://secunia.com/advisories/50632" }, { "name": "http://secunia.com/advisories/50689", "refsource": "MISC", "url": "http://secunia.com/advisories/50689" }, { "name": "http://secunia.com/advisories/50860", "refsource": "MISC", "url": "http://secunia.com/advisories/50860" }, { "name": "http://secunia.com/advisories/50913", "refsource": "MISC", "url": "http://secunia.com/advisories/50913" }, { "name": "http://wiki.xen.org/wiki/Security_Announcements#XSA-17_Qemu_VT100_emulation_vulnerability", "refsource": "MISC", "url": "http://wiki.xen.org/wiki/Security_Announcements#XSA-17_Qemu_VT100_emulation_vulnerability" }, { "name": "http://www.debian.org/security/2012/dsa-2543", "refsource": "MISC", "url": "http://www.debian.org/security/2012/dsa-2543" }, { "name": "http://www.debian.org/security/2012/dsa-2545", "refsource": "MISC", "url": "http://www.debian.org/security/2012/dsa-2545" }, { "name": "http://www.openwall.com/lists/oss-security/2012/09/05/10", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2012/09/05/10" }, { "name": "http://www.securityfocus.com/bid/55413", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/55413" }, { "name": "http://www.ubuntu.com/usn/USN-1590-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/USN-1590-1" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:ltss:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:virtualization:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:virtualization:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-3515" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a \"device model\u0027s address space.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "50530", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/50530" }, { "name": "http://wiki.xen.org/wiki/Security_Announcements#XSA-17_Qemu_VT100_emulation_vulnerability", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://wiki.xen.org/wiki/Security_Announcements#XSA-17_Qemu_VT100_emulation_vulnerability" }, { "name": "[oss-security] 20120905 Xen Security Advisory 17 (CVE-2012-3515) - Qemu VT100 emulation vulnerability", "refsource": "MLIST", "tags": [ "Mailing List", "Mitigation", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2012/09/05/10" }, { "name": "50472", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/50472" }, { "name": "[Xen-announce] 20120905 Xen Security Advisory 17 (CVE-2012-3515) - Qemu VT100 emulation vulnerability", "refsource": "MLIST", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "http://lists.xen.org/archives/html/xen-announce/2012-09/msg00003.html" }, { "name": "http://support.citrix.com/article/CTX134708", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://support.citrix.com/article/CTX134708" }, { "name": "openSUSE-SU-2012:1174", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html" }, { "name": "openSUSE-SU-2012:1172", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html" }, { "name": "SUSE-SU-2012:1205", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00027.html" }, { "name": "SUSE-SU-2012:1203", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00026.html" }, { "name": "DSA-2545", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2012/dsa-2545" }, { "name": "SUSE-SU-2012:1320", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00002.html" }, { "name": "SUSE-SU-2012:1129", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00001.html" }, { "name": "openSUSE-SU-2012:1572", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" }, { "name": "SUSE-SU-2012:1135", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00005.html" }, { "name": "SUSE-SU-2012:1133", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html" }, { "name": "openSUSE-SU-2012:1153", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2012-09/msg00051.html" }, { "name": "SUSE-SU-2012:1202", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00024.html" }, { "name": "RHSA-2012:1234", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1234.html" }, { "name": "DSA-2543", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2012/dsa-2543" }, { "name": "openSUSE-SU-2012:1170", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00016.html" }, { "name": "SUSE-SU-2012:1132", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html" }, { "name": "USN-1590-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-1590-1" }, { "name": "SUSE-SU-2012:1162", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00012.html" }, { "name": "RHSA-2012:1235", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1235.html" }, { "name": "RHSA-2012:1325", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1325.html" }, { "name": "RHSA-2012:1233", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1233.html" }, { "name": "RHSA-2012:1236", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1236.html" }, { "name": "RHSA-2012:1262", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1262.html" }, { "name": "55413", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/55413" }, { "name": "50860", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/50860" }, { "name": "50632", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/50632" }, { "name": "50528", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/50528" }, { "name": "50689", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/50689" }, { "name": "50913", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/50913" }, { "name": "51413", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/51413" }, { "name": "GLSA-201309-24", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-201309-24.xml" }, { "name": "55082", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/55082" }, { "name": "openSUSE-SU-2012:1573", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" }, { "name": "GLSA-201604-03", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201604-03" }, { "name": "http://git.qemu.org/?p=qemu-stable-0.15.git%3Ba=log", "refsource": "MISC", "tags": [], "url": "http://git.qemu.org/?p=qemu-stable-0.15.git%3Ba=log" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false } }, "lastModifiedDate": "2023-02-13T04:34Z", "publishedDate": "2012-11-23T20:55Z" } } }
RHSA-2012:1233
Vulnerability from csaf_redhat
Published
2012-09-05 16:31
Modified
2024-11-22 05:47
Summary
Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update
Notes
Topic
Updated qemu-kvm-rhev packages that fix one security issue and two bugs are
now available for Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.
Details
KVM (Kernel-based Virtual Machine) is a full virtualization solution for
Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev packages form the
user-space component for running virtual machines using KVM.
A flaw was found in the way QEMU handled VT100 terminal escape sequences
when emulating certain character devices. A guest user with privileges to
write to a character device that is emulated on the host using a virtual
console back-end could use this flaw to crash the qemu-kvm process on the
host or, possibly, escalate their privileges on the host. (CVE-2012-3515)
When using qemu-kvm-rhev on a Red Hat Enterprise Linux 6 host not managed
by Red Hat Enterprise Virtualization:
* This flaw did not affect the default use of KVM. Affected configurations
were:
- When guests were started from the command line ("/usr/libexec/qemu-kvm")
without the "-nodefaults" option, and also without specifying a
serial or parallel device, or a virtio-console device, that specifically
does not use a virtual console (vc) back-end. (Note that Red Hat does not
support invoking "qemu-kvm" from the command line without "-nodefaults" on
Red Hat Enterprise Linux 6.)
- Guests that were managed via libvirt, such as when using Virtual Machine
Manager (virt-manager), but that have a serial or parallel device, or a
virtio-console device, that uses a virtual console back-end. By default,
guests managed via libvirt will not use a virtual console back-end for such
devices.
When using qemu-kvm-rhev on a Red Hat Enterprise Virtualization managed Red
Hat Enterprise Linux 6 host:
* This flaw did not affect the default use of a Red Hat Enterprise
Virtualization host: it is not possible to add a device that uses a virtual
console back-end via Red Hat Enterprise Virtualization Manager.
To specify a virtual console back-end for a device and therefore be
vulnerable to this issue, the device would have to be created another way,
for example, by using a VDSM hook.
Red Hat would like to thank the Xen project for reporting this issue.
This update also fixes the following bugs:
* Previously, the KVM modules were not loaded by the postinstall scriptlet
of RPM scripts. This bug caused various issues and required the system to
be rebooted to resolve them. With this update, the modules are loaded
properly by the scriptlet and no unnecessary reboots are now required.
(BZ#839897)
* Previously, when a guest was started up with two serial devices, qemu-kvm
returned an error message and terminated the boot because IRQ 4 for the ISA
bus was being used by both devices. This update fixes the qemu-kvm code,
which allows IRQ 4 to be used by more than one device on the ISA bus, and
the boot now succeeds in the described scenario. (BZ#840054)
All users of qemu-kvm-rhev are advised to upgrade to these updated
packages, which fix these issues. After installing this update, shut down
all running virtual machines. Once all virtual machines have shut down,
start them again for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated qemu-kvm-rhev packages that fix one security issue and two bugs are\nnow available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on AMD64 and Intel 64 systems. The qemu-kvm-rhev packages form the\nuser-space component for running virtual machines using KVM.\n\nA flaw was found in the way QEMU handled VT100 terminal escape sequences\nwhen emulating certain character devices. A guest user with privileges to\nwrite to a character device that is emulated on the host using a virtual\nconsole back-end could use this flaw to crash the qemu-kvm process on the\nhost or, possibly, escalate their privileges on the host. (CVE-2012-3515)\n\nWhen using qemu-kvm-rhev on a Red Hat Enterprise Linux 6 host not managed\nby Red Hat Enterprise Virtualization:\n\n* This flaw did not affect the default use of KVM. Affected configurations\nwere:\n\n- When guests were started from the command line (\"/usr/libexec/qemu-kvm\")\nwithout the \"-nodefaults\" option, and also without specifying a\nserial or parallel device, or a virtio-console device, that specifically\ndoes not use a virtual console (vc) back-end. (Note that Red Hat does not\nsupport invoking \"qemu-kvm\" from the command line without \"-nodefaults\" on\nRed Hat Enterprise Linux 6.)\n\n- Guests that were managed via libvirt, such as when using Virtual Machine\nManager (virt-manager), but that have a serial or parallel device, or a\nvirtio-console device, that uses a virtual console back-end. By default,\nguests managed via libvirt will not use a virtual console back-end for such\ndevices.\n\nWhen using qemu-kvm-rhev on a Red Hat Enterprise Virtualization managed Red\nHat Enterprise Linux 6 host:\n\n* This flaw did not affect the default use of a Red Hat Enterprise\nVirtualization host: it is not possible to add a device that uses a virtual\nconsole back-end via Red Hat Enterprise Virtualization Manager.\n\nTo specify a virtual console back-end for a device and therefore be\nvulnerable to this issue, the device would have to be created another way,\nfor example, by using a VDSM hook.\n\nRed Hat would like to thank the Xen project for reporting this issue.\n\nThis update also fixes the following bugs:\n\n* Previously, the KVM modules were not loaded by the postinstall scriptlet\nof RPM scripts. This bug caused various issues and required the system to\nbe rebooted to resolve them. With this update, the modules are loaded\nproperly by the scriptlet and no unnecessary reboots are now required.\n(BZ#839897)\n\n* Previously, when a guest was started up with two serial devices, qemu-kvm\nreturned an error message and terminated the boot because IRQ 4 for the ISA\nbus was being used by both devices. This update fixes the qemu-kvm code,\nwhich allows IRQ 4 to be used by more than one device on the ISA bus, and\nthe boot now succeeds in the described scenario. (BZ#840054)\n\nAll users of qemu-kvm-rhev are advised to upgrade to these updated\npackages, which fix these issues. After installing this update, shut down\nall running virtual machines. Once all virtual machines have shut down,\nstart them again for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:1233", "url": "https://access.redhat.com/errata/RHSA-2012:1233" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "851252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851252" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_1233.json" } ], "title": "Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update", "tracking": { "current_release_date": "2024-11-22T05:47:10+00:00", "generator": { "date": "2024-11-22T05:47:10+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2012:1233", "initial_release_date": "2012-09-05T16:31:00+00:00", "revision_history": [ { "date": "2012-09-05T16:31:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-09-05T16:35:45+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T05:47:10+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEV Agents (vdsm)", "product": { "name": "RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:6::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.src", "product": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.src", "product_id": "qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@0.12.1.2-2.295.el6_3.2?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "product": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_id": "qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@0.12.1.2-2.295.el6_3.2?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-img-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "product": { "name": "qemu-img-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_id": "qemu-img-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-img-rhev@0.12.1.2-2.295.el6_3.2?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "product": { "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_id": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@0.12.1.2-2.295.el6_3.2?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "product": { "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_id": "qemu-kvm-rhev-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev-tools@0.12.1.2-2.295.el6_3.2?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "qemu-img-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents:qemu-img-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-img-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Server-RHEV-Agents" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.src as a component of RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.src" }, "product_reference": "qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.src", "relates_to_product_reference": "6Server-RHEV-Agents" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Server-RHEV-Agents" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Server-RHEV-Agents" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents:qemu-kvm-rhev-tools-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-rhev-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Server-RHEV-Agents" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Xen project" ] } ], "cve": "CVE-2012-3515", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2012-08-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "851252" } ], "notes": [ { "category": "description", "text": "Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a \"device model\u0027s address space.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: VT100 emulation vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did affect the versions of xen package as shipped with Red Hat\nEnterprise Linux 5.\n\nThis issue did affect the versions of kvm package as shipped with Red Hat\nEnterprise Linux 5.\n\nThis issue did affect the versions of qemu-kvm package as shipped with Red Hat\nEnterprise Linux 6.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Agents:qemu-img-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.src", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-tools-2:0.12.1.2-2.295.el6_3.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3515" }, { "category": "external", "summary": "RHBZ#851252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851252" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3515", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3515" } ], "release_date": "2012-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-05T16:31:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Server-RHEV-Agents:qemu-img-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.src", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-tools-2:0.12.1.2-2.295.el6_3.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1233" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 7.4, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Server-RHEV-Agents:qemu-img-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.src", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-tools-2:0.12.1.2-2.295.el6_3.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: VT100 emulation vulnerability" } ] }
rhsa-2012_1236
Vulnerability from csaf_redhat
Published
2012-09-05 16:47
Modified
2024-11-22 05:47
Summary
Red Hat Security Advisory: xen security update
Notes
Topic
Updated xen packages that fix one security issue are now available for
Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.
Details
The xen packages contain administration tools and the xend service for
managing the kernel-xen kernel for virtualization on Red Hat Enterprise
Linux.
A flaw was found in the way QEMU handled VT100 terminal escape sequences
when emulating certain character devices. A guest user with privileges to
write to a character device that is emulated on the host using a virtual
console back-end could use this flaw to crash the qemu process on the
host or, possibly, escalate their privileges on the host. (CVE-2012-3515)
This flaw did not affect the default use of the Xen hypervisor
implementation in Red Hat Enterprise Linux 5. This problem only affected
fully-virtualized guests that have a serial or parallel device that uses a
virtual console (vc) back-end. By default, the virtual console back-end is
not used for such devices; only guests explicitly configured to use them
in this way were affected.
Red Hat would like to thank the Xen project for reporting this issue.
All users of xen are advised to upgrade to these updated packages, which
correct this issue. After installing the updated packages, all
fully-virtualized guests must be restarted for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated xen packages that fix one security issue are now available for\nRed Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "The xen packages contain administration tools and the xend service for\nmanaging the kernel-xen kernel for virtualization on Red Hat Enterprise\nLinux.\n\nA flaw was found in the way QEMU handled VT100 terminal escape sequences\nwhen emulating certain character devices. A guest user with privileges to\nwrite to a character device that is emulated on the host using a virtual\nconsole back-end could use this flaw to crash the qemu process on the\nhost or, possibly, escalate their privileges on the host. (CVE-2012-3515)\n\nThis flaw did not affect the default use of the Xen hypervisor\nimplementation in Red Hat Enterprise Linux 5. This problem only affected\nfully-virtualized guests that have a serial or parallel device that uses a\nvirtual console (vc) back-end. By default, the virtual console back-end is\nnot used for such devices; only guests explicitly configured to use them\nin this way were affected.\n\nRed Hat would like to thank the Xen project for reporting this issue.\n\nAll users of xen are advised to upgrade to these updated packages, which\ncorrect this issue. After installing the updated packages, all\nfully-virtualized guests must be restarted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:1236", "url": "https://access.redhat.com/errata/RHSA-2012:1236" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "851252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851252" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_1236.json" } ], "title": "Red Hat Security Advisory: xen security update", "tracking": { "current_release_date": "2024-11-22T05:47:23+00:00", "generator": { "date": "2024-11-22T05:47:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2012:1236", "initial_release_date": "2012-09-05T16:47:00+00:00", "revision_history": [ { "date": "2012-09-05T16:47:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-09-05T16:56:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T05:47:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEL Desktop Multi OS (v. 5 client)", "product": { "name": "RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_virtualization:5::client" } } }, { "category": "product_name", "name": "RHEL Virtualization (v. 5 server)", "product": { "name": "RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_virtualization:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "xen-devel-0:3.0.3-135.el5_8.5.x86_64", "product": { "name": "xen-devel-0:3.0.3-135.el5_8.5.x86_64", "product_id": "xen-devel-0:3.0.3-135.el5_8.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen-devel@3.0.3-135.el5_8.5?arch=x86_64" } } }, { "category": "product_version", "name": "xen-0:3.0.3-135.el5_8.5.x86_64", "product": { "name": "xen-0:3.0.3-135.el5_8.5.x86_64", "product_id": "xen-0:3.0.3-135.el5_8.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen@3.0.3-135.el5_8.5?arch=x86_64" } } }, { "category": "product_version", "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "product": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "product_id": "xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen-debuginfo@3.0.3-135.el5_8.5?arch=x86_64" } } }, { "category": "product_version", "name": "xen-libs-0:3.0.3-135.el5_8.5.x86_64", "product": { "name": "xen-libs-0:3.0.3-135.el5_8.5.x86_64", "product_id": "xen-libs-0:3.0.3-135.el5_8.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen-libs@3.0.3-135.el5_8.5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "xen-devel-0:3.0.3-135.el5_8.5.i386", "product": { "name": "xen-devel-0:3.0.3-135.el5_8.5.i386", "product_id": "xen-devel-0:3.0.3-135.el5_8.5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen-devel@3.0.3-135.el5_8.5?arch=i386" } } }, { "category": "product_version", "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "product": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "product_id": "xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen-debuginfo@3.0.3-135.el5_8.5?arch=i386" } } }, { "category": "product_version", "name": "xen-0:3.0.3-135.el5_8.5.i386", "product": { "name": "xen-0:3.0.3-135.el5_8.5.i386", "product_id": "xen-0:3.0.3-135.el5_8.5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen@3.0.3-135.el5_8.5?arch=i386" } } }, { "category": "product_version", "name": "xen-libs-0:3.0.3-135.el5_8.5.i386", "product": { "name": "xen-libs-0:3.0.3-135.el5_8.5.i386", "product_id": "xen-libs-0:3.0.3-135.el5_8.5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen-libs@3.0.3-135.el5_8.5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "xen-devel-0:3.0.3-135.el5_8.5.ia64", "product": { "name": "xen-devel-0:3.0.3-135.el5_8.5.ia64", "product_id": "xen-devel-0:3.0.3-135.el5_8.5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen-devel@3.0.3-135.el5_8.5?arch=ia64" } } }, { "category": "product_version", "name": "xen-0:3.0.3-135.el5_8.5.ia64", "product": { "name": "xen-0:3.0.3-135.el5_8.5.ia64", "product_id": "xen-0:3.0.3-135.el5_8.5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen@3.0.3-135.el5_8.5?arch=ia64" } } }, { "category": "product_version", "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "product": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "product_id": "xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen-debuginfo@3.0.3-135.el5_8.5?arch=ia64" } } }, { "category": "product_version", "name": "xen-libs-0:3.0.3-135.el5_8.5.ia64", "product": { "name": "xen-libs-0:3.0.3-135.el5_8.5.ia64", "product_id": "xen-libs-0:3.0.3-135.el5_8.5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen-libs@3.0.3-135.el5_8.5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "xen-0:3.0.3-135.el5_8.5.src", "product": { "name": "xen-0:3.0.3-135.el5_8.5.src", "product_id": "xen-0:3.0.3-135.el5_8.5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen@3.0.3-135.el5_8.5?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.src" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.src", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.i386 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.ia64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.src as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.src" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.src", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.x86_64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.i386 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.ia64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.5.i386 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.5.ia64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.5.x86_64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.5.i386 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.5.ia64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.5.x86_64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.src" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.src", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.i386 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.ia64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.src as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.src" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.src", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.x86_64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.i386 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.ia64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.5.i386 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.5.ia64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.5.x86_64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.5.i386 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.5.ia64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.5.x86_64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Server-VT-5.8.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Xen project" ] } ], "cve": "CVE-2012-3515", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2012-08-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "851252" } ], "notes": [ { "category": "description", "text": "Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a \"device model\u0027s address space.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: VT100 emulation vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did affect the versions of xen package as shipped with Red Hat\nEnterprise Linux 5.\n\nThis issue did affect the versions of kvm package as shipped with Red Hat\nEnterprise Linux 5.\n\nThis issue did affect the versions of qemu-kvm package as shipped with Red Hat\nEnterprise Linux 6.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386", "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64", "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.src", "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64", "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386", "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64", "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64", "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386", "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64", "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.src", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64", "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386", "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64", "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64", "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386", "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64", "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.src", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64", "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386", "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64", "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64", "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386", "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64", "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.src", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64", "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386", "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64", "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64", "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386", "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64", "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3515" }, { "category": "external", "summary": "RHBZ#851252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851252" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3515", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3515" } ], "release_date": "2012-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-05T16:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386", "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64", "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.src", "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64", "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386", "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64", "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64", "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386", "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64", "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.src", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64", "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386", "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64", "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64", "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386", "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64", "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.src", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64", "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386", "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64", "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64", "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386", "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64", "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.src", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64", "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386", "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64", "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64", "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386", "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64", "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1236" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 7.4, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386", "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64", "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.src", "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64", "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386", "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64", "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64", "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386", "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64", "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.src", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64", "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386", "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64", "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64", "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386", "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64", "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.src", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64", "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386", "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64", "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64", "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386", "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64", "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.src", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64", "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386", "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64", "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64", "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386", "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64", "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: VT100 emulation vulnerability" } ] }
rhsa-2012:1233
Vulnerability from csaf_redhat
Published
2012-09-05 16:31
Modified
2024-11-22 05:47
Summary
Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update
Notes
Topic
Updated qemu-kvm-rhev packages that fix one security issue and two bugs are
now available for Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.
Details
KVM (Kernel-based Virtual Machine) is a full virtualization solution for
Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev packages form the
user-space component for running virtual machines using KVM.
A flaw was found in the way QEMU handled VT100 terminal escape sequences
when emulating certain character devices. A guest user with privileges to
write to a character device that is emulated on the host using a virtual
console back-end could use this flaw to crash the qemu-kvm process on the
host or, possibly, escalate their privileges on the host. (CVE-2012-3515)
When using qemu-kvm-rhev on a Red Hat Enterprise Linux 6 host not managed
by Red Hat Enterprise Virtualization:
* This flaw did not affect the default use of KVM. Affected configurations
were:
- When guests were started from the command line ("/usr/libexec/qemu-kvm")
without the "-nodefaults" option, and also without specifying a
serial or parallel device, or a virtio-console device, that specifically
does not use a virtual console (vc) back-end. (Note that Red Hat does not
support invoking "qemu-kvm" from the command line without "-nodefaults" on
Red Hat Enterprise Linux 6.)
- Guests that were managed via libvirt, such as when using Virtual Machine
Manager (virt-manager), but that have a serial or parallel device, or a
virtio-console device, that uses a virtual console back-end. By default,
guests managed via libvirt will not use a virtual console back-end for such
devices.
When using qemu-kvm-rhev on a Red Hat Enterprise Virtualization managed Red
Hat Enterprise Linux 6 host:
* This flaw did not affect the default use of a Red Hat Enterprise
Virtualization host: it is not possible to add a device that uses a virtual
console back-end via Red Hat Enterprise Virtualization Manager.
To specify a virtual console back-end for a device and therefore be
vulnerable to this issue, the device would have to be created another way,
for example, by using a VDSM hook.
Red Hat would like to thank the Xen project for reporting this issue.
This update also fixes the following bugs:
* Previously, the KVM modules were not loaded by the postinstall scriptlet
of RPM scripts. This bug caused various issues and required the system to
be rebooted to resolve them. With this update, the modules are loaded
properly by the scriptlet and no unnecessary reboots are now required.
(BZ#839897)
* Previously, when a guest was started up with two serial devices, qemu-kvm
returned an error message and terminated the boot because IRQ 4 for the ISA
bus was being used by both devices. This update fixes the qemu-kvm code,
which allows IRQ 4 to be used by more than one device on the ISA bus, and
the boot now succeeds in the described scenario. (BZ#840054)
All users of qemu-kvm-rhev are advised to upgrade to these updated
packages, which fix these issues. After installing this update, shut down
all running virtual machines. Once all virtual machines have shut down,
start them again for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated qemu-kvm-rhev packages that fix one security issue and two bugs are\nnow available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on AMD64 and Intel 64 systems. The qemu-kvm-rhev packages form the\nuser-space component for running virtual machines using KVM.\n\nA flaw was found in the way QEMU handled VT100 terminal escape sequences\nwhen emulating certain character devices. A guest user with privileges to\nwrite to a character device that is emulated on the host using a virtual\nconsole back-end could use this flaw to crash the qemu-kvm process on the\nhost or, possibly, escalate their privileges on the host. (CVE-2012-3515)\n\nWhen using qemu-kvm-rhev on a Red Hat Enterprise Linux 6 host not managed\nby Red Hat Enterprise Virtualization:\n\n* This flaw did not affect the default use of KVM. Affected configurations\nwere:\n\n- When guests were started from the command line (\"/usr/libexec/qemu-kvm\")\nwithout the \"-nodefaults\" option, and also without specifying a\nserial or parallel device, or a virtio-console device, that specifically\ndoes not use a virtual console (vc) back-end. (Note that Red Hat does not\nsupport invoking \"qemu-kvm\" from the command line without \"-nodefaults\" on\nRed Hat Enterprise Linux 6.)\n\n- Guests that were managed via libvirt, such as when using Virtual Machine\nManager (virt-manager), but that have a serial or parallel device, or a\nvirtio-console device, that uses a virtual console back-end. By default,\nguests managed via libvirt will not use a virtual console back-end for such\ndevices.\n\nWhen using qemu-kvm-rhev on a Red Hat Enterprise Virtualization managed Red\nHat Enterprise Linux 6 host:\n\n* This flaw did not affect the default use of a Red Hat Enterprise\nVirtualization host: it is not possible to add a device that uses a virtual\nconsole back-end via Red Hat Enterprise Virtualization Manager.\n\nTo specify a virtual console back-end for a device and therefore be\nvulnerable to this issue, the device would have to be created another way,\nfor example, by using a VDSM hook.\n\nRed Hat would like to thank the Xen project for reporting this issue.\n\nThis update also fixes the following bugs:\n\n* Previously, the KVM modules were not loaded by the postinstall scriptlet\nof RPM scripts. This bug caused various issues and required the system to\nbe rebooted to resolve them. With this update, the modules are loaded\nproperly by the scriptlet and no unnecessary reboots are now required.\n(BZ#839897)\n\n* Previously, when a guest was started up with two serial devices, qemu-kvm\nreturned an error message and terminated the boot because IRQ 4 for the ISA\nbus was being used by both devices. This update fixes the qemu-kvm code,\nwhich allows IRQ 4 to be used by more than one device on the ISA bus, and\nthe boot now succeeds in the described scenario. (BZ#840054)\n\nAll users of qemu-kvm-rhev are advised to upgrade to these updated\npackages, which fix these issues. After installing this update, shut down\nall running virtual machines. Once all virtual machines have shut down,\nstart them again for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:1233", "url": "https://access.redhat.com/errata/RHSA-2012:1233" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "851252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851252" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_1233.json" } ], "title": "Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update", "tracking": { "current_release_date": "2024-11-22T05:47:10+00:00", "generator": { "date": "2024-11-22T05:47:10+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2012:1233", "initial_release_date": "2012-09-05T16:31:00+00:00", "revision_history": [ { "date": "2012-09-05T16:31:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-09-05T16:35:45+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T05:47:10+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEV Agents (vdsm)", "product": { "name": "RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:6::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.src", "product": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.src", "product_id": "qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@0.12.1.2-2.295.el6_3.2?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "product": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_id": "qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@0.12.1.2-2.295.el6_3.2?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-img-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "product": { "name": "qemu-img-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_id": "qemu-img-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-img-rhev@0.12.1.2-2.295.el6_3.2?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "product": { "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_id": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@0.12.1.2-2.295.el6_3.2?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "product": { "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_id": "qemu-kvm-rhev-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev-tools@0.12.1.2-2.295.el6_3.2?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "qemu-img-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents:qemu-img-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-img-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Server-RHEV-Agents" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.src as a component of RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.src" }, "product_reference": "qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.src", "relates_to_product_reference": "6Server-RHEV-Agents" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Server-RHEV-Agents" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Server-RHEV-Agents" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents:qemu-kvm-rhev-tools-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-rhev-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Server-RHEV-Agents" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Xen project" ] } ], "cve": "CVE-2012-3515", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2012-08-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "851252" } ], "notes": [ { "category": "description", "text": "Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a \"device model\u0027s address space.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: VT100 emulation vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did affect the versions of xen package as shipped with Red Hat\nEnterprise Linux 5.\n\nThis issue did affect the versions of kvm package as shipped with Red Hat\nEnterprise Linux 5.\n\nThis issue did affect the versions of qemu-kvm package as shipped with Red Hat\nEnterprise Linux 6.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Agents:qemu-img-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.src", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-tools-2:0.12.1.2-2.295.el6_3.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3515" }, { "category": "external", "summary": "RHBZ#851252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851252" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3515", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3515" } ], "release_date": "2012-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-05T16:31:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Server-RHEV-Agents:qemu-img-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.src", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-tools-2:0.12.1.2-2.295.el6_3.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1233" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 7.4, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Server-RHEV-Agents:qemu-img-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.src", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-tools-2:0.12.1.2-2.295.el6_3.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: VT100 emulation vulnerability" } ] }
rhsa-2012:1236
Vulnerability from csaf_redhat
Published
2012-09-05 16:47
Modified
2024-11-22 05:47
Summary
Red Hat Security Advisory: xen security update
Notes
Topic
Updated xen packages that fix one security issue are now available for
Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.
Details
The xen packages contain administration tools and the xend service for
managing the kernel-xen kernel for virtualization on Red Hat Enterprise
Linux.
A flaw was found in the way QEMU handled VT100 terminal escape sequences
when emulating certain character devices. A guest user with privileges to
write to a character device that is emulated on the host using a virtual
console back-end could use this flaw to crash the qemu process on the
host or, possibly, escalate their privileges on the host. (CVE-2012-3515)
This flaw did not affect the default use of the Xen hypervisor
implementation in Red Hat Enterprise Linux 5. This problem only affected
fully-virtualized guests that have a serial or parallel device that uses a
virtual console (vc) back-end. By default, the virtual console back-end is
not used for such devices; only guests explicitly configured to use them
in this way were affected.
Red Hat would like to thank the Xen project for reporting this issue.
All users of xen are advised to upgrade to these updated packages, which
correct this issue. After installing the updated packages, all
fully-virtualized guests must be restarted for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated xen packages that fix one security issue are now available for\nRed Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "The xen packages contain administration tools and the xend service for\nmanaging the kernel-xen kernel for virtualization on Red Hat Enterprise\nLinux.\n\nA flaw was found in the way QEMU handled VT100 terminal escape sequences\nwhen emulating certain character devices. A guest user with privileges to\nwrite to a character device that is emulated on the host using a virtual\nconsole back-end could use this flaw to crash the qemu process on the\nhost or, possibly, escalate their privileges on the host. (CVE-2012-3515)\n\nThis flaw did not affect the default use of the Xen hypervisor\nimplementation in Red Hat Enterprise Linux 5. This problem only affected\nfully-virtualized guests that have a serial or parallel device that uses a\nvirtual console (vc) back-end. By default, the virtual console back-end is\nnot used for such devices; only guests explicitly configured to use them\nin this way were affected.\n\nRed Hat would like to thank the Xen project for reporting this issue.\n\nAll users of xen are advised to upgrade to these updated packages, which\ncorrect this issue. After installing the updated packages, all\nfully-virtualized guests must be restarted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:1236", "url": "https://access.redhat.com/errata/RHSA-2012:1236" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "851252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851252" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_1236.json" } ], "title": "Red Hat Security Advisory: xen security update", "tracking": { "current_release_date": "2024-11-22T05:47:23+00:00", "generator": { "date": "2024-11-22T05:47:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2012:1236", "initial_release_date": "2012-09-05T16:47:00+00:00", "revision_history": [ { "date": "2012-09-05T16:47:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-09-05T16:56:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T05:47:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEL Desktop Multi OS (v. 5 client)", "product": { "name": "RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_virtualization:5::client" } } }, { "category": "product_name", "name": "RHEL Virtualization (v. 5 server)", "product": { "name": "RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_virtualization:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "xen-devel-0:3.0.3-135.el5_8.5.x86_64", "product": { "name": "xen-devel-0:3.0.3-135.el5_8.5.x86_64", "product_id": "xen-devel-0:3.0.3-135.el5_8.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen-devel@3.0.3-135.el5_8.5?arch=x86_64" } } }, { "category": "product_version", "name": "xen-0:3.0.3-135.el5_8.5.x86_64", "product": { "name": "xen-0:3.0.3-135.el5_8.5.x86_64", "product_id": "xen-0:3.0.3-135.el5_8.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen@3.0.3-135.el5_8.5?arch=x86_64" } } }, { "category": "product_version", "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "product": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "product_id": "xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen-debuginfo@3.0.3-135.el5_8.5?arch=x86_64" } } }, { "category": "product_version", "name": "xen-libs-0:3.0.3-135.el5_8.5.x86_64", "product": { "name": "xen-libs-0:3.0.3-135.el5_8.5.x86_64", "product_id": "xen-libs-0:3.0.3-135.el5_8.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen-libs@3.0.3-135.el5_8.5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "xen-devel-0:3.0.3-135.el5_8.5.i386", "product": { "name": "xen-devel-0:3.0.3-135.el5_8.5.i386", "product_id": "xen-devel-0:3.0.3-135.el5_8.5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen-devel@3.0.3-135.el5_8.5?arch=i386" } } }, { "category": "product_version", "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "product": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "product_id": "xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen-debuginfo@3.0.3-135.el5_8.5?arch=i386" } } }, { "category": "product_version", "name": "xen-0:3.0.3-135.el5_8.5.i386", "product": { "name": "xen-0:3.0.3-135.el5_8.5.i386", "product_id": "xen-0:3.0.3-135.el5_8.5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen@3.0.3-135.el5_8.5?arch=i386" } } }, { "category": "product_version", "name": "xen-libs-0:3.0.3-135.el5_8.5.i386", "product": { "name": "xen-libs-0:3.0.3-135.el5_8.5.i386", "product_id": "xen-libs-0:3.0.3-135.el5_8.5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen-libs@3.0.3-135.el5_8.5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "xen-devel-0:3.0.3-135.el5_8.5.ia64", "product": { "name": "xen-devel-0:3.0.3-135.el5_8.5.ia64", "product_id": "xen-devel-0:3.0.3-135.el5_8.5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen-devel@3.0.3-135.el5_8.5?arch=ia64" } } }, { "category": "product_version", "name": "xen-0:3.0.3-135.el5_8.5.ia64", "product": { "name": "xen-0:3.0.3-135.el5_8.5.ia64", "product_id": "xen-0:3.0.3-135.el5_8.5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen@3.0.3-135.el5_8.5?arch=ia64" } } }, { "category": "product_version", "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "product": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "product_id": "xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen-debuginfo@3.0.3-135.el5_8.5?arch=ia64" } } }, { "category": "product_version", "name": "xen-libs-0:3.0.3-135.el5_8.5.ia64", "product": { "name": "xen-libs-0:3.0.3-135.el5_8.5.ia64", "product_id": "xen-libs-0:3.0.3-135.el5_8.5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen-libs@3.0.3-135.el5_8.5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "xen-0:3.0.3-135.el5_8.5.src", "product": { "name": "xen-0:3.0.3-135.el5_8.5.src", "product_id": "xen-0:3.0.3-135.el5_8.5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen@3.0.3-135.el5_8.5?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.src" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.src", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.i386 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.ia64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.src as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.src" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.src", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.x86_64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.i386 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.ia64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.5.i386 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.5.ia64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.5.x86_64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.5.i386 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.5.ia64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.5.x86_64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.src" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.src", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.i386 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.ia64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.src as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.src" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.src", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.x86_64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.i386 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.ia64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.5.i386 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.5.ia64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.5.x86_64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.5.i386 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.5.ia64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.5.x86_64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Server-VT-5.8.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Xen project" ] } ], "cve": "CVE-2012-3515", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2012-08-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "851252" } ], "notes": [ { "category": "description", "text": "Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a \"device model\u0027s address space.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: VT100 emulation vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did affect the versions of xen package as shipped with Red Hat\nEnterprise Linux 5.\n\nThis issue did affect the versions of kvm package as shipped with Red Hat\nEnterprise Linux 5.\n\nThis issue did affect the versions of qemu-kvm package as shipped with Red Hat\nEnterprise Linux 6.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386", "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64", "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.src", "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64", "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386", "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64", "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64", "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386", "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64", "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.src", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64", "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386", "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64", "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64", "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386", "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64", "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.src", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64", "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386", "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64", "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64", "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386", "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64", "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.src", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64", "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386", "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64", "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64", "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386", "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64", "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3515" }, { "category": "external", "summary": "RHBZ#851252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851252" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3515", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3515" } ], "release_date": "2012-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-05T16:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386", "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64", "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.src", "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64", "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386", "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64", "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64", "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386", "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64", "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.src", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64", "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386", "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64", "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64", "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386", "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64", "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.src", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64", "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386", "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64", "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64", "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386", "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64", "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.src", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64", "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386", "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64", "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64", "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386", "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64", "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1236" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 7.4, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386", "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64", "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.src", "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64", "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386", "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64", "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64", "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386", "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64", "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.src", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64", "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386", "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64", "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64", "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386", "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64", "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.src", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64", "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386", "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64", "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64", "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386", "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64", "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.src", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64", "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386", "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64", "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64", "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386", "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64", "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: VT100 emulation vulnerability" } ] }
rhsa-2012_1262
Vulnerability from csaf_redhat
Published
2012-09-13 16:48
Modified
2012-09-13 16:48
Summary
Red Hat Security Advisory: rhev-hypervisor5 security and bug fix update
Notes
Topic
An updated rhev-hypervisor5 package that fixes multiple security issues and
various bugs is now available.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
The rhev-hypervisor5 package provides a Red Hat Enterprise Virtualization
Hypervisor ISO disk image. The Red Hat Enterprise Virtualization
Hypervisor is a dedicated Kernel-based Virtual Machine (KVM) hypervisor.
It includes everything necessary to run and manage virtual machines: A
subset of the Red Hat Enterprise Linux operating environment and the Red
Hat Enterprise Virtualization Agent.
Note: Red Hat Enterprise Virtualization Hypervisor is only available for
the Intel 64 and AMD64 architectures with virtualization extensions.
A flaw was found in the way QEMU handled VT100 terminal escape sequences
when emulating certain character devices. A guest user with privileges to
write to a character device that is emulated on the host using a virtual
console back-end could use this flaw to crash the qemu-kvm process on the
host or, possibly, escalate their privileges on the host. (CVE-2012-3515)
Multiple integer overflow flaws, leading to stack-based buffer overflows,
were found in glibc's functions for converting a string to a numeric
representation (strtod(), strtof(), and strtold()). If an application used
such a function on attacker controlled input, it could cause the
application to crash or, potentially, execute arbitrary code.
(CVE-2012-3480)
Red Hat would like to thank the Xen project for reporting the CVE-2012-3515
issue.
This updated package provides updated components that include various bug
fixes, as well as a fix for CVE-2012-3515 in the xen package; however, for
this component, it had no security impact on Red Hat Enterprise
Virtualization Hypervisor itself.
Users of Red Hat Enterprise Virtualization Hypervisor are advised to
upgrade to this updated package, which fixes these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 2023 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated rhev-hypervisor5 package that fixes multiple security issues and\nvarious bugs is now available.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The rhev-hypervisor5 package provides a Red Hat Enterprise Virtualization\nHypervisor ISO disk image. The Red Hat Enterprise Virtualization\nHypervisor is a dedicated Kernel-based Virtual Machine (KVM) hypervisor.\nIt includes everything necessary to run and manage virtual machines: A\nsubset of the Red Hat Enterprise Linux operating environment and the Red\nHat Enterprise Virtualization Agent.\n\nNote: Red Hat Enterprise Virtualization Hypervisor is only available for\nthe Intel 64 and AMD64 architectures with virtualization extensions.\n\nA flaw was found in the way QEMU handled VT100 terminal escape sequences\nwhen emulating certain character devices. A guest user with privileges to\nwrite to a character device that is emulated on the host using a virtual\nconsole back-end could use this flaw to crash the qemu-kvm process on the\nhost or, possibly, escalate their privileges on the host. (CVE-2012-3515)\n\nMultiple integer overflow flaws, leading to stack-based buffer overflows,\nwere found in glibc\u0027s functions for converting a string to a numeric\nrepresentation (strtod(), strtof(), and strtold()). If an application used\nsuch a function on attacker controlled input, it could cause the\napplication to crash or, potentially, execute arbitrary code.\n(CVE-2012-3480)\n\nRed Hat would like to thank the Xen project for reporting the CVE-2012-3515\nissue.\n\nThis updated package provides updated components that include various bug\nfixes, as well as a fix for CVE-2012-3515 in the xen package; however, for\nthis component, it had no security impact on Red Hat Enterprise\nVirtualization Hypervisor itself.\n\nUsers of Red Hat Enterprise Virtualization Hypervisor are advised to\nupgrade to this updated package, which fixes these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:1262", "url": "https://access.redhat.com/errata/RHSA-2012:1262" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/5/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "url": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/5/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html" }, { "category": "external", "summary": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "url": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2012/rhsa-2012_1262.json" } ], "title": "Red Hat Security Advisory: rhev-hypervisor5 security and bug fix update", "tracking": { "current_release_date": "2012-09-13T16:48:00Z", "generator": { "date": "2023-06-30T20:40:00Z", "engine": { "name": "Red Hat SDEngine", "version": "3.18.0" } }, "id": "RHSA-2012:1262", "initial_release_date": "2012-09-13T16:48:00Z", "revision_history": [ { "date": "2012-09-13T16:48:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_family", "name": "Red Hat Virtualization", "product": { "name": "Red Hat Virtualization", "product_id": "Red Hat Virtualization" } } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-3480", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "discovery_date": "2012-08-13T00:00:00Z", "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=847715" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "Multiple integer overflows in the (1) strtod, (2) strtof, (3) strtold, (4) strtod_l, and other unspecified \"related functions\" in stdlib in GNU C Library (aka glibc or libc6) 2.16 allow local users to cause a denial of service (application crash) and possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "glibc: Integer overflows, leading to stack-based buffer overflows in strto* related routines", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Virtualization" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3480", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3480" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3480", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3480" }, { "category": "external", "summary": "CVE-2012-3480", "url": "https://access.redhat.com/security/cve/CVE-2012-3480" }, { "category": "external", "summary": "bz#847715: CVE-2012-3480 glibc: Integer overflows, leading to stack-based buffer overflows in strto* related routines", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=847715" } ], "release_date": "2012-08-12T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization\n2.2 environments using the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/5/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization\n3.0 environments using the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "Red Hat Virtualization" ], "url": "https://access.redhat.com/errata/RHSA-2012:1262" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "availabilityRequirement": "NOT_DEFINED", "baseScore": 4.4, "collateralDamagePotential": "NOT_DEFINED", "confidentialityImpact": "PARTIAL", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 0.0, "exploitability": "NOT_DEFINED", "integrityImpact": "PARTIAL", "integrityRequirement": "NOT_DEFINED", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "targetDistribution": "NOT_DEFINED", "temporalScore": 0.0, "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat Virtualization" ] } ], "threats": [ { "category": "impact", "date": "2012-08-13T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2012-3480 glibc: Integer overflows, leading to stack-based buffer overflows in strto* related routines" }, { "acknowledgments": [ { "names": [ "Xen project" ] } ], "cve": "CVE-2012-3515", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2012-08-23T00:00:00Z", "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=851252" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a \"device model\u0027s address space.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "VT100 emulation vulnerability", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Virtualization" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3515", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3515" }, { "category": "external", "summary": "CVE-2012-3515", "url": "https://access.redhat.com/security/cve/CVE-2012-3515" }, { "category": "external", "summary": "bz#851252: VT100 emulation vulnerability", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851252" } ], "release_date": "2012-09-05T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization\n2.2 environments using the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/5/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization\n3.0 environments using the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "Red Hat Virtualization" ], "url": "https://access.redhat.com/errata/RHSA-2012:1262" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "availabilityRequirement": "NOT_DEFINED", "baseScore": 7.4, "collateralDamagePotential": "NOT_DEFINED", "confidentialityImpact": "COMPLETE", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 0.0, "exploitability": "NOT_DEFINED", "integrityImpact": "COMPLETE", "integrityRequirement": "NOT_DEFINED", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "targetDistribution": "NOT_DEFINED", "temporalScore": 0.0, "vectorString": "AV:A/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "Red Hat Virtualization" ] } ], "threats": [ { "category": "impact", "date": "2012-08-23T00:00:00Z", "details": "Important" } ], "title": "VT100 emulation vulnerability" } ] }
rhsa-2012:1235
Vulnerability from csaf_redhat
Published
2012-09-05 16:43
Modified
2024-11-22 05:47
Summary
Red Hat Security Advisory: kvm security update
Notes
Topic
Updated kvm packages that fix one security issue are now available for
Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.
Details
KVM (Kernel-based Virtual Machine) is a full virtualization solution for
Linux on AMD64 and Intel 64 systems. KVM is a Linux kernel module built
for the standard Red Hat Enterprise Linux kernel.
A flaw was found in the way QEMU handled VT100 terminal escape sequences
when emulating certain character devices. A guest user with privileges to
write to a character device that is emulated on the host using a virtual
console back-end could use this flaw to crash the qemu-kvm process on the
host or, possibly, escalate their privileges on the host. (CVE-2012-3515)
This flaw did not affect the default use of KVM. Affected configurations
were:
* When guests were started from the command line ("/usr/libexec/qemu-kvm"),
and without specifying a serial or parallel device that specifically does
not use a virtual console (vc) back-end. (Note that Red Hat does not
support invoking "qemu-kvm" from the command line on Red Hat Enterprise
Linux 5.)
* Guests that were managed via libvirt, such as when using Virtual Machine
Manager (virt-manager), but that have a serial or parallel device that uses
a virtual console back-end. By default, guests managed via libvirt will not
use a virtual console back-end for such devices.
Red Hat would like to thank the Xen project for reporting this issue.
All KVM users should upgrade to these updated packages, which correct this
issue. Note: The procedure in the Solution section must be performed before
this update will take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kvm packages that fix one security issue are now available for\nRed Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on AMD64 and Intel 64 systems. KVM is a Linux kernel module built\nfor the standard Red Hat Enterprise Linux kernel.\n\nA flaw was found in the way QEMU handled VT100 terminal escape sequences\nwhen emulating certain character devices. A guest user with privileges to\nwrite to a character device that is emulated on the host using a virtual\nconsole back-end could use this flaw to crash the qemu-kvm process on the\nhost or, possibly, escalate their privileges on the host. (CVE-2012-3515)\n\nThis flaw did not affect the default use of KVM. Affected configurations\nwere:\n\n* When guests were started from the command line (\"/usr/libexec/qemu-kvm\"),\nand without specifying a serial or parallel device that specifically does\nnot use a virtual console (vc) back-end. (Note that Red Hat does not\nsupport invoking \"qemu-kvm\" from the command line on Red Hat Enterprise\nLinux 5.)\n\n* Guests that were managed via libvirt, such as when using Virtual Machine\nManager (virt-manager), but that have a serial or parallel device that uses\na virtual console back-end. By default, guests managed via libvirt will not\nuse a virtual console back-end for such devices.\n\nRed Hat would like to thank the Xen project for reporting this issue.\n\nAll KVM users should upgrade to these updated packages, which correct this\nissue. Note: The procedure in the Solution section must be performed before\nthis update will take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:1235", "url": "https://access.redhat.com/errata/RHSA-2012:1235" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "851252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851252" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_1235.json" } ], "title": "Red Hat Security Advisory: kvm security update", "tracking": { "current_release_date": "2024-11-22T05:47:19+00:00", "generator": { "date": "2024-11-22T05:47:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2012:1235", "initial_release_date": "2012-09-05T16:43:00+00:00", "revision_history": [ { "date": "2012-09-05T16:43:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-09-05T16:45:53+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T05:47:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEL Desktop Multi OS (v. 5 client)", "product": { "name": "RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_virtualization:5::client" } } }, { "category": "product_name", "name": "RHEL Virtualization (v. 5 server)", "product": { "name": "RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_virtualization:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kvm-debuginfo-0:83-249.el5_8.5.x86_64", "product": { "name": "kvm-debuginfo-0:83-249.el5_8.5.x86_64", "product_id": "kvm-debuginfo-0:83-249.el5_8.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm-debuginfo@83-249.el5_8.5?arch=x86_64" } } }, { "category": "product_version", "name": "kvm-0:83-249.el5_8.5.x86_64", "product": { "name": "kvm-0:83-249.el5_8.5.x86_64", "product_id": "kvm-0:83-249.el5_8.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm@83-249.el5_8.5?arch=x86_64" } } }, { "category": "product_version", "name": "kmod-kvm-0:83-249.el5_8.5.x86_64", "product": { "name": "kmod-kvm-0:83-249.el5_8.5.x86_64", "product_id": "kmod-kvm-0:83-249.el5_8.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kmod-kvm@83-249.el5_8.5?arch=x86_64" } } }, { "category": "product_version", "name": "kmod-kvm-debug-0:83-249.el5_8.5.x86_64", "product": { "name": "kmod-kvm-debug-0:83-249.el5_8.5.x86_64", "product_id": "kmod-kvm-debug-0:83-249.el5_8.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kmod-kvm-debug@83-249.el5_8.5?arch=x86_64" } } }, { "category": "product_version", "name": "kvm-qemu-img-0:83-249.el5_8.5.x86_64", "product": { "name": "kvm-qemu-img-0:83-249.el5_8.5.x86_64", "product_id": "kvm-qemu-img-0:83-249.el5_8.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm-qemu-img@83-249.el5_8.5?arch=x86_64" } } }, { "category": "product_version", "name": "kvm-tools-0:83-249.el5_8.5.x86_64", "product": { "name": "kvm-tools-0:83-249.el5_8.5.x86_64", "product_id": "kvm-tools-0:83-249.el5_8.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm-tools@83-249.el5_8.5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kvm-0:83-249.el5_8.5.src", "product": { "name": "kvm-0:83-249.el5_8.5.src", "product_id": "kvm-0:83-249.el5_8.5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm@83-249.el5_8.5?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kmod-kvm-0:83-249.el5_8.5.x86_64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:kmod-kvm-0:83-249.el5_8.5.x86_64" }, "product_reference": "kmod-kvm-0:83-249.el5_8.5.x86_64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kmod-kvm-debug-0:83-249.el5_8.5.x86_64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:kmod-kvm-debug-0:83-249.el5_8.5.x86_64" }, "product_reference": "kmod-kvm-debug-0:83-249.el5_8.5.x86_64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0:83-249.el5_8.5.src as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:kvm-0:83-249.el5_8.5.src" }, "product_reference": "kvm-0:83-249.el5_8.5.src", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0:83-249.el5_8.5.x86_64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:kvm-0:83-249.el5_8.5.x86_64" }, "product_reference": "kvm-0:83-249.el5_8.5.x86_64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-debuginfo-0:83-249.el5_8.5.x86_64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:kvm-debuginfo-0:83-249.el5_8.5.x86_64" }, "product_reference": "kvm-debuginfo-0:83-249.el5_8.5.x86_64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-qemu-img-0:83-249.el5_8.5.x86_64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:kvm-qemu-img-0:83-249.el5_8.5.x86_64" }, "product_reference": "kvm-qemu-img-0:83-249.el5_8.5.x86_64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-tools-0:83-249.el5_8.5.x86_64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:kvm-tools-0:83-249.el5_8.5.x86_64" }, "product_reference": "kvm-tools-0:83-249.el5_8.5.x86_64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kmod-kvm-0:83-249.el5_8.5.x86_64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:kmod-kvm-0:83-249.el5_8.5.x86_64" }, "product_reference": "kmod-kvm-0:83-249.el5_8.5.x86_64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kmod-kvm-debug-0:83-249.el5_8.5.x86_64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:kmod-kvm-debug-0:83-249.el5_8.5.x86_64" }, "product_reference": "kmod-kvm-debug-0:83-249.el5_8.5.x86_64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0:83-249.el5_8.5.src as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:kvm-0:83-249.el5_8.5.src" }, "product_reference": "kvm-0:83-249.el5_8.5.src", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0:83-249.el5_8.5.x86_64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:kvm-0:83-249.el5_8.5.x86_64" }, "product_reference": "kvm-0:83-249.el5_8.5.x86_64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-debuginfo-0:83-249.el5_8.5.x86_64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:kvm-debuginfo-0:83-249.el5_8.5.x86_64" }, "product_reference": "kvm-debuginfo-0:83-249.el5_8.5.x86_64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-qemu-img-0:83-249.el5_8.5.x86_64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:kvm-qemu-img-0:83-249.el5_8.5.x86_64" }, "product_reference": "kvm-qemu-img-0:83-249.el5_8.5.x86_64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-tools-0:83-249.el5_8.5.x86_64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:kvm-tools-0:83-249.el5_8.5.x86_64" }, "product_reference": "kvm-tools-0:83-249.el5_8.5.x86_64", "relates_to_product_reference": "5Server-VT-5.8.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Xen project" ] } ], "cve": "CVE-2012-3515", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2012-08-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "851252" } ], "notes": [ { "category": "description", "text": "Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a \"device model\u0027s address space.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: VT100 emulation vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did affect the versions of xen package as shipped with Red Hat\nEnterprise Linux 5.\n\nThis issue did affect the versions of kvm package as shipped with Red Hat\nEnterprise Linux 5.\n\nThis issue did affect the versions of qemu-kvm package as shipped with Red Hat\nEnterprise Linux 6.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-VT-5.8.Z:kmod-kvm-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kmod-kvm-debug-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kvm-0:83-249.el5_8.5.src", "5Client-VT-5.8.Z:kvm-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kvm-debuginfo-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kvm-qemu-img-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kvm-tools-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kmod-kvm-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kmod-kvm-debug-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kvm-0:83-249.el5_8.5.src", "5Server-VT-5.8.Z:kvm-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kvm-debuginfo-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kvm-qemu-img-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kvm-tools-0:83-249.el5_8.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3515" }, { "category": "external", "summary": "RHBZ#851252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851252" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3515", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3515" } ], "release_date": "2012-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-05T16:43:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nThe following procedure must be performed before this update will take\neffect:\n\n1) Stop all KVM guest virtual machines.\n\n2) Either reboot the hypervisor machine or, as the root user, remove (using\n\"modprobe -r [module]\") and reload (using \"modprobe [module]\") all of the\nfollowing modules which are currently running (determined using \"lsmod\"):\nkvm, ksm, kvm-intel or kvm-amd.\n\n3) Restart the KVM guest virtual machines.", "product_ids": [ "5Client-VT-5.8.Z:kmod-kvm-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kmod-kvm-debug-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kvm-0:83-249.el5_8.5.src", "5Client-VT-5.8.Z:kvm-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kvm-debuginfo-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kvm-qemu-img-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kvm-tools-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kmod-kvm-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kmod-kvm-debug-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kvm-0:83-249.el5_8.5.src", "5Server-VT-5.8.Z:kvm-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kvm-debuginfo-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kvm-qemu-img-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kvm-tools-0:83-249.el5_8.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1235" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 7.4, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Client-VT-5.8.Z:kmod-kvm-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kmod-kvm-debug-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kvm-0:83-249.el5_8.5.src", "5Client-VT-5.8.Z:kvm-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kvm-debuginfo-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kvm-qemu-img-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kvm-tools-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kmod-kvm-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kmod-kvm-debug-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kvm-0:83-249.el5_8.5.src", "5Server-VT-5.8.Z:kvm-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kvm-debuginfo-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kvm-qemu-img-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kvm-tools-0:83-249.el5_8.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: VT100 emulation vulnerability" } ] }
RHSA-2012:1325
Vulnerability from csaf_redhat
Published
2012-10-02 17:09
Modified
2024-11-22 05:47
Summary
Red Hat Security Advisory: rhev-hypervisor6 security and bug fix update
Notes
Topic
An updated rhev-hypervisor6 package that fixes multiple security issues and
one bug is now available.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization
Hypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor
is a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes
everything necessary to run and manage virtual machines: A subset of the
Red Hat Enterprise Linux operating environment and the Red Hat Enterprise
Virtualization Agent.
Note: Red Hat Enterprise Virtualization Hypervisor is only available for
the Intel 64 and AMD64 architectures with virtualization extensions.
A flaw was found in the way QEMU handled VT100 terminal escape sequences
when emulating certain character devices. A guest user with privileges to
write to a character device that is emulated on the host using a virtual
console back-end could use this flaw to crash the qemu-kvm process on the
host or, possibly, escalate their privileges on the host. (CVE-2012-3515)
This flaw did not affect the default use of Red Hat Enterprise
Virtualization Hypervisor: it is not possible to add a device that uses a
virtual console back-end via Red Hat Enterprise Virtualization Manager.
To specify a virtual console back-end for a device and therefore be
vulnerable to this issue, the device would have to be created another way,
for example, by using a VDSM hook. Note that at this time hooks can only be
used on Red Hat Enterprise Linux hosts, not Red Hat Enterprise
Virtualization Hypervisor.
Multiple integer overflow flaws, leading to stack-based buffer overflows,
were found in glibc's functions for converting a string to a numeric
representation (strtod(), strtof(), and strtold()). If an application used
such a function on attacker controlled input, it could cause the
application to crash or, potentially, execute arbitrary code.
(CVE-2012-3480)
Red Hat would like to thank the Xen project for reporting the CVE-2012-3515
issue.
This updated package provides updated components that include fixes for
various security issues. These issues have no security impact on Red Hat
Enterprise Virtualization Hypervisor itself, however. The security fixes
included in this update address the following CVE numbers:
CVE-2012-4244 (bind issue)
CVE-2012-3524 (dbus issue)
CVE-2012-2313, CVE-2012-2384, CVE-2012-2390, CVE-2012-3430, and
CVE-2012-3552 (kernel issues)
CVE-2012-3445 (libvirt issue)
CVE-2011-3102 and CVE-2012-2807 (libxml2 issues)
CVE-2011-1202, CVE-2011-3970, CVE-2012-2825, CVE-2012-2870, CVE-2012-2871,
and CVE-2012-2893 (libxslt issues)
This updated Red Hat Enterprise Virtualization Hypervisor package also
fixes the following bug:
* Previously, the Manager listed all installed Hypervisor ISO images as
available even when they did not support the VDSM compatibility version
required by the selected host. The rhev-hypervisor6 package now maintains a
text file for each installed ISO image. The file lists the VDSM
compatibility versions supported by the relevant ISO image. The Manager
uses this information to ensure that only those Hypervisor ISO images that
are relevant to the selected host are listed. (BZ#856827)
Users of the Red Hat Enterprise Virtualization Hypervisor are advised to
upgrade to this updated package, which fixes these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated rhev-hypervisor6 package that fixes multiple security issues and\none bug is now available.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization\nHypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor\nis a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes\neverything necessary to run and manage virtual machines: A subset of the\nRed Hat Enterprise Linux operating environment and the Red Hat Enterprise\nVirtualization Agent.\n\nNote: Red Hat Enterprise Virtualization Hypervisor is only available for\nthe Intel 64 and AMD64 architectures with virtualization extensions.\n\nA flaw was found in the way QEMU handled VT100 terminal escape sequences\nwhen emulating certain character devices. A guest user with privileges to\nwrite to a character device that is emulated on the host using a virtual\nconsole back-end could use this flaw to crash the qemu-kvm process on the\nhost or, possibly, escalate their privileges on the host. (CVE-2012-3515)\n\nThis flaw did not affect the default use of Red Hat Enterprise\nVirtualization Hypervisor: it is not possible to add a device that uses a\nvirtual console back-end via Red Hat Enterprise Virtualization Manager.\n\nTo specify a virtual console back-end for a device and therefore be\nvulnerable to this issue, the device would have to be created another way,\nfor example, by using a VDSM hook. Note that at this time hooks can only be\nused on Red Hat Enterprise Linux hosts, not Red Hat Enterprise\nVirtualization Hypervisor.\n\nMultiple integer overflow flaws, leading to stack-based buffer overflows,\nwere found in glibc\u0027s functions for converting a string to a numeric\nrepresentation (strtod(), strtof(), and strtold()). If an application used\nsuch a function on attacker controlled input, it could cause the\napplication to crash or, potentially, execute arbitrary code.\n(CVE-2012-3480)\n\nRed Hat would like to thank the Xen project for reporting the CVE-2012-3515\nissue.\n\nThis updated package provides updated components that include fixes for\nvarious security issues. These issues have no security impact on Red Hat\nEnterprise Virtualization Hypervisor itself, however. The security fixes\nincluded in this update address the following CVE numbers:\n\nCVE-2012-4244 (bind issue)\n\nCVE-2012-3524 (dbus issue)\n\nCVE-2012-2313, CVE-2012-2384, CVE-2012-2390, CVE-2012-3430, and\nCVE-2012-3552 (kernel issues)\n\nCVE-2012-3445 (libvirt issue)\n\nCVE-2011-3102 and CVE-2012-2807 (libxml2 issues)\n\nCVE-2011-1202, CVE-2011-3970, CVE-2012-2825, CVE-2012-2870, CVE-2012-2871,\nand CVE-2012-2893 (libxslt issues)\n\nThis updated Red Hat Enterprise Virtualization Hypervisor package also\nfixes the following bug:\n\n* Previously, the Manager listed all installed Hypervisor ISO images as\navailable even when they did not support the VDSM compatibility version\nrequired by the selected host. The rhev-hypervisor6 package now maintains a\ntext file for each installed ISO image. The file lists the VDSM\ncompatibility versions supported by the relevant ISO image. The Manager\nuses this information to ensure that only those Hypervisor ISO images that\nare relevant to the selected host are listed. (BZ#856827)\n\nUsers of the Red Hat Enterprise Virtualization Hypervisor are advised to\nupgrade to this updated package, which fixes these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:1325", "url": "https://access.redhat.com/errata/RHSA-2012:1325" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/5/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "url": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/5/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html" }, { "category": "external", "summary": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "url": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html" }, { "category": "external", "summary": "847715", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=847715" }, { "category": "external", "summary": "851252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851252" }, { "category": "external", "summary": "856827", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=856827" }, { "category": "external", "summary": "856830", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=856830" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_1325.json" } ], "title": "Red Hat Security Advisory: rhev-hypervisor6 security and bug fix update", "tracking": { "current_release_date": "2024-11-22T05:47:27+00:00", "generator": { "date": "2024-11-22T05:47:27+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2012:1325", "initial_release_date": "2012-10-02T17:09:00+00:00", "revision_history": [ { "date": "2012-10-02T17:09:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-10-02T17:10:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T05:47:27+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEV Hypervisor for RHEL-6", "product": { "name": "RHEV Hypervisor for RHEL-6", "product_id": "6Server-RHEV-Hypervisor", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "rhev-hypervisor6-0:6.3-20120926.0.el6_3.noarch", "product": { "name": "rhev-hypervisor6-0:6.3-20120926.0.el6_3.noarch", "product_id": "rhev-hypervisor6-0:6.3-20120926.0.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhev-hypervisor6@6.3-20120926.0.el6_3?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhev-hypervisor6-0:6.3-20120926.0.el6_3.noarch as a component of RHEV Hypervisor for RHEL-6", "product_id": "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.3-20120926.0.el6_3.noarch" }, "product_reference": "rhev-hypervisor6-0:6.3-20120926.0.el6_3.noarch", "relates_to_product_reference": "6Server-RHEV-Hypervisor" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-3480", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "discovery_date": "2012-08-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "847715" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the (1) strtod, (2) strtof, (3) strtold, (4) strtod_l, and other unspecified \"related functions\" in stdlib in GNU C Library (aka glibc or libc6) 2.16 allow local users to cause a denial of service (application crash) and possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "glibc: Integer overflows, leading to stack-based buffer overflows in strto* related routines", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.3-20120926.0.el6_3.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3480" }, { "category": "external", "summary": "RHBZ#847715", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=847715" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3480", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3480" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3480", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3480" } ], "release_date": "2012-08-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-10-02T17:09:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization 2.2\nenvironments using the disk image provided by this package, refer to: \n\nhttps://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/5/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization 3.0\nenvironments using the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.3-20120926.0.el6_3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1325" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.3-20120926.0.el6_3.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "glibc: Integer overflows, leading to stack-based buffer overflows in strto* related routines" }, { "acknowledgments": [ { "names": [ "Xen project" ] } ], "cve": "CVE-2012-3515", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2012-08-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "851252" } ], "notes": [ { "category": "description", "text": "Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a \"device model\u0027s address space.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: VT100 emulation vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did affect the versions of xen package as shipped with Red Hat\nEnterprise Linux 5.\n\nThis issue did affect the versions of kvm package as shipped with Red Hat\nEnterprise Linux 5.\n\nThis issue did affect the versions of qemu-kvm package as shipped with Red Hat\nEnterprise Linux 6.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.3-20120926.0.el6_3.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3515" }, { "category": "external", "summary": "RHBZ#851252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851252" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3515", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3515" } ], "release_date": "2012-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-10-02T17:09:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization 2.2\nenvironments using the disk image provided by this package, refer to: \n\nhttps://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/5/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization 3.0\nenvironments using the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.3-20120926.0.el6_3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1325" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 7.4, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.3-20120926.0.el6_3.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: VT100 emulation vulnerability" } ] }
RHSA-2012:1236
Vulnerability from csaf_redhat
Published
2012-09-05 16:47
Modified
2024-11-22 05:47
Summary
Red Hat Security Advisory: xen security update
Notes
Topic
Updated xen packages that fix one security issue are now available for
Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.
Details
The xen packages contain administration tools and the xend service for
managing the kernel-xen kernel for virtualization on Red Hat Enterprise
Linux.
A flaw was found in the way QEMU handled VT100 terminal escape sequences
when emulating certain character devices. A guest user with privileges to
write to a character device that is emulated on the host using a virtual
console back-end could use this flaw to crash the qemu process on the
host or, possibly, escalate their privileges on the host. (CVE-2012-3515)
This flaw did not affect the default use of the Xen hypervisor
implementation in Red Hat Enterprise Linux 5. This problem only affected
fully-virtualized guests that have a serial or parallel device that uses a
virtual console (vc) back-end. By default, the virtual console back-end is
not used for such devices; only guests explicitly configured to use them
in this way were affected.
Red Hat would like to thank the Xen project for reporting this issue.
All users of xen are advised to upgrade to these updated packages, which
correct this issue. After installing the updated packages, all
fully-virtualized guests must be restarted for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated xen packages that fix one security issue are now available for\nRed Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "The xen packages contain administration tools and the xend service for\nmanaging the kernel-xen kernel for virtualization on Red Hat Enterprise\nLinux.\n\nA flaw was found in the way QEMU handled VT100 terminal escape sequences\nwhen emulating certain character devices. A guest user with privileges to\nwrite to a character device that is emulated on the host using a virtual\nconsole back-end could use this flaw to crash the qemu process on the\nhost or, possibly, escalate their privileges on the host. (CVE-2012-3515)\n\nThis flaw did not affect the default use of the Xen hypervisor\nimplementation in Red Hat Enterprise Linux 5. This problem only affected\nfully-virtualized guests that have a serial or parallel device that uses a\nvirtual console (vc) back-end. By default, the virtual console back-end is\nnot used for such devices; only guests explicitly configured to use them\nin this way were affected.\n\nRed Hat would like to thank the Xen project for reporting this issue.\n\nAll users of xen are advised to upgrade to these updated packages, which\ncorrect this issue. After installing the updated packages, all\nfully-virtualized guests must be restarted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:1236", "url": "https://access.redhat.com/errata/RHSA-2012:1236" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "851252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851252" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_1236.json" } ], "title": "Red Hat Security Advisory: xen security update", "tracking": { "current_release_date": "2024-11-22T05:47:23+00:00", "generator": { "date": "2024-11-22T05:47:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2012:1236", "initial_release_date": "2012-09-05T16:47:00+00:00", "revision_history": [ { "date": "2012-09-05T16:47:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-09-05T16:56:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T05:47:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEL Desktop Multi OS (v. 5 client)", "product": { "name": "RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_virtualization:5::client" } } }, { "category": "product_name", "name": "RHEL Virtualization (v. 5 server)", "product": { "name": "RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_virtualization:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "xen-devel-0:3.0.3-135.el5_8.5.x86_64", "product": { "name": "xen-devel-0:3.0.3-135.el5_8.5.x86_64", "product_id": "xen-devel-0:3.0.3-135.el5_8.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen-devel@3.0.3-135.el5_8.5?arch=x86_64" } } }, { "category": "product_version", "name": "xen-0:3.0.3-135.el5_8.5.x86_64", "product": { "name": "xen-0:3.0.3-135.el5_8.5.x86_64", "product_id": "xen-0:3.0.3-135.el5_8.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen@3.0.3-135.el5_8.5?arch=x86_64" } } }, { "category": "product_version", "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "product": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "product_id": "xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen-debuginfo@3.0.3-135.el5_8.5?arch=x86_64" } } }, { "category": "product_version", "name": "xen-libs-0:3.0.3-135.el5_8.5.x86_64", "product": { "name": "xen-libs-0:3.0.3-135.el5_8.5.x86_64", "product_id": "xen-libs-0:3.0.3-135.el5_8.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen-libs@3.0.3-135.el5_8.5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "xen-devel-0:3.0.3-135.el5_8.5.i386", "product": { "name": "xen-devel-0:3.0.3-135.el5_8.5.i386", "product_id": "xen-devel-0:3.0.3-135.el5_8.5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen-devel@3.0.3-135.el5_8.5?arch=i386" } } }, { "category": "product_version", "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "product": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "product_id": "xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen-debuginfo@3.0.3-135.el5_8.5?arch=i386" } } }, { "category": "product_version", "name": "xen-0:3.0.3-135.el5_8.5.i386", "product": { "name": "xen-0:3.0.3-135.el5_8.5.i386", "product_id": "xen-0:3.0.3-135.el5_8.5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen@3.0.3-135.el5_8.5?arch=i386" } } }, { "category": "product_version", "name": "xen-libs-0:3.0.3-135.el5_8.5.i386", "product": { "name": "xen-libs-0:3.0.3-135.el5_8.5.i386", "product_id": "xen-libs-0:3.0.3-135.el5_8.5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen-libs@3.0.3-135.el5_8.5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "xen-devel-0:3.0.3-135.el5_8.5.ia64", "product": { "name": "xen-devel-0:3.0.3-135.el5_8.5.ia64", "product_id": "xen-devel-0:3.0.3-135.el5_8.5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen-devel@3.0.3-135.el5_8.5?arch=ia64" } } }, { "category": "product_version", "name": "xen-0:3.0.3-135.el5_8.5.ia64", "product": { "name": "xen-0:3.0.3-135.el5_8.5.ia64", "product_id": "xen-0:3.0.3-135.el5_8.5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen@3.0.3-135.el5_8.5?arch=ia64" } } }, { "category": "product_version", "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "product": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "product_id": "xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen-debuginfo@3.0.3-135.el5_8.5?arch=ia64" } } }, { "category": "product_version", "name": "xen-libs-0:3.0.3-135.el5_8.5.ia64", "product": { "name": "xen-libs-0:3.0.3-135.el5_8.5.ia64", "product_id": "xen-libs-0:3.0.3-135.el5_8.5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen-libs@3.0.3-135.el5_8.5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "xen-0:3.0.3-135.el5_8.5.src", "product": { "name": "xen-0:3.0.3-135.el5_8.5.src", "product_id": "xen-0:3.0.3-135.el5_8.5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/xen@3.0.3-135.el5_8.5?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.src" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.src", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.i386 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.ia64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.src as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.src" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.src", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.x86_64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.i386 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.ia64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.5.i386 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.5.ia64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.5.x86_64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.5.i386 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.5.ia64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.5.x86_64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.src" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.src", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.i386 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.ia64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.src as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.src" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.src", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-0:3.0.3-135.el5_8.5.x86_64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.i386 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.ia64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.5.i386 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.5.ia64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-0:3.0.3-135.el5_8.5.x86_64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-devel-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.5.i386 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.5.i386", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.5.ia64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.5.ia64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-0:3.0.3-135.el5_8.5.x86_64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64" }, "product_reference": "xen-libs-0:3.0.3-135.el5_8.5.x86_64", "relates_to_product_reference": "5Server-VT-5.8.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Xen project" ] } ], "cve": "CVE-2012-3515", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2012-08-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "851252" } ], "notes": [ { "category": "description", "text": "Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a \"device model\u0027s address space.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: VT100 emulation vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did affect the versions of xen package as shipped with Red Hat\nEnterprise Linux 5.\n\nThis issue did affect the versions of kvm package as shipped with Red Hat\nEnterprise Linux 5.\n\nThis issue did affect the versions of qemu-kvm package as shipped with Red Hat\nEnterprise Linux 6.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386", "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64", "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.src", "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64", "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386", "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64", "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64", "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386", "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64", "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.src", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64", "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386", "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64", "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64", "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386", "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64", "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.src", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64", "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386", "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64", "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64", "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386", "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64", "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.src", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64", "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386", "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64", "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64", "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386", "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64", "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3515" }, { "category": "external", "summary": "RHBZ#851252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851252" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3515", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3515" } ], "release_date": "2012-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-05T16:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386", "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64", "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.src", "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64", "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386", "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64", "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64", "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386", "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64", "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.src", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64", "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386", "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64", "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64", "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386", "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64", "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.src", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64", "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386", "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64", "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64", "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386", "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64", "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.src", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64", "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386", "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64", "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64", "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386", "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64", "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1236" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 7.4, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386", "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64", "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.src", "5Client-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64", "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "5Client-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386", "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64", "5Client-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64", "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386", "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64", "5Client-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.src", "5Client-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64", "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "5Client-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386", "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64", "5Client-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64", "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386", "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64", "5Client-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.src", "5Server-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64", "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "5Server-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386", "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64", "5Server-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64", "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386", "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64", "5Server-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.i386", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.ia64", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.src", "5Server-VT-5.8.Z:xen-0:3.0.3-135.el5_8.5.x86_64", "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.i386", "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.ia64", "5Server-VT-5.8.Z:xen-debuginfo-0:3.0.3-135.el5_8.5.x86_64", "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.i386", "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.ia64", "5Server-VT-5.8.Z:xen-devel-0:3.0.3-135.el5_8.5.x86_64", "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.i386", "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.ia64", "5Server-VT-5.8.Z:xen-libs-0:3.0.3-135.el5_8.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: VT100 emulation vulnerability" } ] }
rhsa-2012_1234
Vulnerability from csaf_redhat
Published
2012-09-05 16:39
Modified
2024-11-22 05:47
Summary
Red Hat Security Advisory: qemu-kvm security update
Notes
Topic
Updated qemu-kvm packages that fix one security issue are now available for
Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.
Details
KVM (Kernel-based Virtual Machine) is a full virtualization solution for
Linux on AMD64 and Intel 64 systems. qemu-kvm is the user-space
component for running virtual machines using KVM.
A flaw was found in the way QEMU handled VT100 terminal escape sequences
when emulating certain character devices. A guest user with privileges to
write to a character device that is emulated on the host using a virtual
console back-end could use this flaw to crash the qemu-kvm process on the
host or, possibly, escalate their privileges on the host. (CVE-2012-3515)
This flaw did not affect the default use of KVM. Affected configurations
were:
* When guests were started from the command line ("/usr/libexec/qemu-kvm")
without the "-nodefaults" option, and also without specifying a
serial or parallel device, or a virtio-console device, that specifically
does not use a virtual console (vc) back-end. (Note that Red Hat does not
support invoking "qemu-kvm" from the command line without "-nodefaults" on
Red Hat Enterprise Linux 6.)
* Guests that were managed via libvirt, such as when using Virtual Machine
Manager (virt-manager), but that have a serial or parallel device, or a
virtio-console device, that uses a virtual console back-end. By default,
guests managed via libvirt will not use a virtual console back-end
for such devices.
Red Hat would like to thank the Xen project for reporting this issue.
All users of qemu-kvm should upgrade to these updated packages, which
resolve this issue. After installing this update, shut down all running
virtual machines. Once all virtual machines have shut down, start them
again for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated qemu-kvm packages that fix one security issue are now available for\nRed Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on AMD64 and Intel 64 systems. qemu-kvm is the user-space\ncomponent for running virtual machines using KVM.\n\nA flaw was found in the way QEMU handled VT100 terminal escape sequences\nwhen emulating certain character devices. A guest user with privileges to\nwrite to a character device that is emulated on the host using a virtual\nconsole back-end could use this flaw to crash the qemu-kvm process on the\nhost or, possibly, escalate their privileges on the host. (CVE-2012-3515)\n\nThis flaw did not affect the default use of KVM. Affected configurations\nwere:\n\n* When guests were started from the command line (\"/usr/libexec/qemu-kvm\")\nwithout the \"-nodefaults\" option, and also without specifying a\nserial or parallel device, or a virtio-console device, that specifically\ndoes not use a virtual console (vc) back-end. (Note that Red Hat does not\nsupport invoking \"qemu-kvm\" from the command line without \"-nodefaults\" on\nRed Hat Enterprise Linux 6.)\n\n* Guests that were managed via libvirt, such as when using Virtual Machine\nManager (virt-manager), but that have a serial or parallel device, or a\nvirtio-console device, that uses a virtual console back-end. By default,\nguests managed via libvirt will not use a virtual console back-end\nfor such devices.\n\nRed Hat would like to thank the Xen project for reporting this issue.\n\nAll users of qemu-kvm should upgrade to these updated packages, which\nresolve this issue. After installing this update, shut down all running\nvirtual machines. Once all virtual machines have shut down, start them\nagain for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:1234", "url": "https://access.redhat.com/errata/RHSA-2012:1234" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "851252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851252" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_1234.json" } ], "title": "Red Hat Security Advisory: qemu-kvm security update", "tracking": { "current_release_date": "2024-11-22T05:47:14+00:00", "generator": { "date": "2024-11-22T05:47:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2012:1234", "initial_release_date": "2012-09-05T16:39:00+00:00", "revision_history": [ { "date": "2012-09-05T16:39:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-09-05T16:46:06+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T05:47:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "product": { "name": "qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_id": "qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-tools@0.12.1.2-2.295.el6_3.2?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "product": { "name": "qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_id": "qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-img@0.12.1.2-2.295.el6_3.2?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "product": { "name": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_id": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm@0.12.1.2-2.295.el6_3.2?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "product": { "name": "qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_id": "qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-guest-agent@0.12.1.2-2.295.el6_3.2?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "product": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_id": "qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@0.12.1.2-2.295.el6_3.2?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "product": { "name": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "product_id": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm@0.12.1.2-2.295.el6_3.2?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Workstation-6.3.z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Xen project" ] } ], "cve": "CVE-2012-3515", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2012-08-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "851252" } ], "notes": [ { "category": "description", "text": "Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a \"device model\u0027s address space.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: VT100 emulation vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did affect the versions of xen package as shipped with Red Hat\nEnterprise Linux 5.\n\nThis issue did affect the versions of kvm package as shipped with Red Hat\nEnterprise Linux 5.\n\nThis issue did affect the versions of qemu-kvm package as shipped with Red Hat\nEnterprise Linux 6.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Client-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Client-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "6Client-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Client-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Client-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "6ComputeNode-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "6Server-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "6Workstation-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3515" }, { "category": "external", "summary": "RHBZ#851252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851252" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3515", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3515" } ], "release_date": "2012-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-05T16:39:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Client-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Client-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "6Client-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Client-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Client-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "6ComputeNode-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "6Server-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "6Workstation-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1234" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 7.4, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Client-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Client-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Client-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "6Client-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Client-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Client-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "6ComputeNode-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "6Server-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "6Workstation-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: VT100 emulation vulnerability" } ] }
rhsa-2012_1325
Vulnerability from csaf_redhat
Published
2012-10-02 17:09
Modified
2024-11-22 05:47
Summary
Red Hat Security Advisory: rhev-hypervisor6 security and bug fix update
Notes
Topic
An updated rhev-hypervisor6 package that fixes multiple security issues and
one bug is now available.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization
Hypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor
is a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes
everything necessary to run and manage virtual machines: A subset of the
Red Hat Enterprise Linux operating environment and the Red Hat Enterprise
Virtualization Agent.
Note: Red Hat Enterprise Virtualization Hypervisor is only available for
the Intel 64 and AMD64 architectures with virtualization extensions.
A flaw was found in the way QEMU handled VT100 terminal escape sequences
when emulating certain character devices. A guest user with privileges to
write to a character device that is emulated on the host using a virtual
console back-end could use this flaw to crash the qemu-kvm process on the
host or, possibly, escalate their privileges on the host. (CVE-2012-3515)
This flaw did not affect the default use of Red Hat Enterprise
Virtualization Hypervisor: it is not possible to add a device that uses a
virtual console back-end via Red Hat Enterprise Virtualization Manager.
To specify a virtual console back-end for a device and therefore be
vulnerable to this issue, the device would have to be created another way,
for example, by using a VDSM hook. Note that at this time hooks can only be
used on Red Hat Enterprise Linux hosts, not Red Hat Enterprise
Virtualization Hypervisor.
Multiple integer overflow flaws, leading to stack-based buffer overflows,
were found in glibc's functions for converting a string to a numeric
representation (strtod(), strtof(), and strtold()). If an application used
such a function on attacker controlled input, it could cause the
application to crash or, potentially, execute arbitrary code.
(CVE-2012-3480)
Red Hat would like to thank the Xen project for reporting the CVE-2012-3515
issue.
This updated package provides updated components that include fixes for
various security issues. These issues have no security impact on Red Hat
Enterprise Virtualization Hypervisor itself, however. The security fixes
included in this update address the following CVE numbers:
CVE-2012-4244 (bind issue)
CVE-2012-3524 (dbus issue)
CVE-2012-2313, CVE-2012-2384, CVE-2012-2390, CVE-2012-3430, and
CVE-2012-3552 (kernel issues)
CVE-2012-3445 (libvirt issue)
CVE-2011-3102 and CVE-2012-2807 (libxml2 issues)
CVE-2011-1202, CVE-2011-3970, CVE-2012-2825, CVE-2012-2870, CVE-2012-2871,
and CVE-2012-2893 (libxslt issues)
This updated Red Hat Enterprise Virtualization Hypervisor package also
fixes the following bug:
* Previously, the Manager listed all installed Hypervisor ISO images as
available even when they did not support the VDSM compatibility version
required by the selected host. The rhev-hypervisor6 package now maintains a
text file for each installed ISO image. The file lists the VDSM
compatibility versions supported by the relevant ISO image. The Manager
uses this information to ensure that only those Hypervisor ISO images that
are relevant to the selected host are listed. (BZ#856827)
Users of the Red Hat Enterprise Virtualization Hypervisor are advised to
upgrade to this updated package, which fixes these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated rhev-hypervisor6 package that fixes multiple security issues and\none bug is now available.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization\nHypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor\nis a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes\neverything necessary to run and manage virtual machines: A subset of the\nRed Hat Enterprise Linux operating environment and the Red Hat Enterprise\nVirtualization Agent.\n\nNote: Red Hat Enterprise Virtualization Hypervisor is only available for\nthe Intel 64 and AMD64 architectures with virtualization extensions.\n\nA flaw was found in the way QEMU handled VT100 terminal escape sequences\nwhen emulating certain character devices. A guest user with privileges to\nwrite to a character device that is emulated on the host using a virtual\nconsole back-end could use this flaw to crash the qemu-kvm process on the\nhost or, possibly, escalate their privileges on the host. (CVE-2012-3515)\n\nThis flaw did not affect the default use of Red Hat Enterprise\nVirtualization Hypervisor: it is not possible to add a device that uses a\nvirtual console back-end via Red Hat Enterprise Virtualization Manager.\n\nTo specify a virtual console back-end for a device and therefore be\nvulnerable to this issue, the device would have to be created another way,\nfor example, by using a VDSM hook. Note that at this time hooks can only be\nused on Red Hat Enterprise Linux hosts, not Red Hat Enterprise\nVirtualization Hypervisor.\n\nMultiple integer overflow flaws, leading to stack-based buffer overflows,\nwere found in glibc\u0027s functions for converting a string to a numeric\nrepresentation (strtod(), strtof(), and strtold()). If an application used\nsuch a function on attacker controlled input, it could cause the\napplication to crash or, potentially, execute arbitrary code.\n(CVE-2012-3480)\n\nRed Hat would like to thank the Xen project for reporting the CVE-2012-3515\nissue.\n\nThis updated package provides updated components that include fixes for\nvarious security issues. These issues have no security impact on Red Hat\nEnterprise Virtualization Hypervisor itself, however. The security fixes\nincluded in this update address the following CVE numbers:\n\nCVE-2012-4244 (bind issue)\n\nCVE-2012-3524 (dbus issue)\n\nCVE-2012-2313, CVE-2012-2384, CVE-2012-2390, CVE-2012-3430, and\nCVE-2012-3552 (kernel issues)\n\nCVE-2012-3445 (libvirt issue)\n\nCVE-2011-3102 and CVE-2012-2807 (libxml2 issues)\n\nCVE-2011-1202, CVE-2011-3970, CVE-2012-2825, CVE-2012-2870, CVE-2012-2871,\nand CVE-2012-2893 (libxslt issues)\n\nThis updated Red Hat Enterprise Virtualization Hypervisor package also\nfixes the following bug:\n\n* Previously, the Manager listed all installed Hypervisor ISO images as\navailable even when they did not support the VDSM compatibility version\nrequired by the selected host. The rhev-hypervisor6 package now maintains a\ntext file for each installed ISO image. The file lists the VDSM\ncompatibility versions supported by the relevant ISO image. The Manager\nuses this information to ensure that only those Hypervisor ISO images that\nare relevant to the selected host are listed. (BZ#856827)\n\nUsers of the Red Hat Enterprise Virtualization Hypervisor are advised to\nupgrade to this updated package, which fixes these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:1325", "url": "https://access.redhat.com/errata/RHSA-2012:1325" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/5/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "url": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/5/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html" }, { "category": "external", "summary": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "url": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html" }, { "category": "external", "summary": "847715", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=847715" }, { "category": "external", "summary": "851252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851252" }, { "category": "external", "summary": "856827", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=856827" }, { "category": "external", "summary": "856830", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=856830" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_1325.json" } ], "title": "Red Hat Security Advisory: rhev-hypervisor6 security and bug fix update", "tracking": { "current_release_date": "2024-11-22T05:47:27+00:00", "generator": { "date": "2024-11-22T05:47:27+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2012:1325", "initial_release_date": "2012-10-02T17:09:00+00:00", "revision_history": [ { "date": "2012-10-02T17:09:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-10-02T17:10:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T05:47:27+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEV Hypervisor for RHEL-6", "product": { "name": "RHEV Hypervisor for RHEL-6", "product_id": "6Server-RHEV-Hypervisor", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "rhev-hypervisor6-0:6.3-20120926.0.el6_3.noarch", "product": { "name": "rhev-hypervisor6-0:6.3-20120926.0.el6_3.noarch", "product_id": "rhev-hypervisor6-0:6.3-20120926.0.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhev-hypervisor6@6.3-20120926.0.el6_3?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhev-hypervisor6-0:6.3-20120926.0.el6_3.noarch as a component of RHEV Hypervisor for RHEL-6", "product_id": "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.3-20120926.0.el6_3.noarch" }, "product_reference": "rhev-hypervisor6-0:6.3-20120926.0.el6_3.noarch", "relates_to_product_reference": "6Server-RHEV-Hypervisor" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-3480", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "discovery_date": "2012-08-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "847715" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the (1) strtod, (2) strtof, (3) strtold, (4) strtod_l, and other unspecified \"related functions\" in stdlib in GNU C Library (aka glibc or libc6) 2.16 allow local users to cause a denial of service (application crash) and possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "glibc: Integer overflows, leading to stack-based buffer overflows in strto* related routines", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.3-20120926.0.el6_3.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3480" }, { "category": "external", "summary": "RHBZ#847715", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=847715" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3480", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3480" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3480", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3480" } ], "release_date": "2012-08-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-10-02T17:09:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization 2.2\nenvironments using the disk image provided by this package, refer to: \n\nhttps://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/5/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization 3.0\nenvironments using the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.3-20120926.0.el6_3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1325" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.3-20120926.0.el6_3.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "glibc: Integer overflows, leading to stack-based buffer overflows in strto* related routines" }, { "acknowledgments": [ { "names": [ "Xen project" ] } ], "cve": "CVE-2012-3515", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2012-08-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "851252" } ], "notes": [ { "category": "description", "text": "Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a \"device model\u0027s address space.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: VT100 emulation vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did affect the versions of xen package as shipped with Red Hat\nEnterprise Linux 5.\n\nThis issue did affect the versions of kvm package as shipped with Red Hat\nEnterprise Linux 5.\n\nThis issue did affect the versions of qemu-kvm package as shipped with Red Hat\nEnterprise Linux 6.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.3-20120926.0.el6_3.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3515" }, { "category": "external", "summary": "RHBZ#851252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851252" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3515", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3515" } ], "release_date": "2012-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-10-02T17:09:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization 2.2\nenvironments using the disk image provided by this package, refer to: \n\nhttps://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/5/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization 3.0\nenvironments using the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.3-20120926.0.el6_3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1325" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 7.4, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.3-20120926.0.el6_3.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: VT100 emulation vulnerability" } ] }
RHSA-2012:1235
Vulnerability from csaf_redhat
Published
2012-09-05 16:43
Modified
2024-11-22 05:47
Summary
Red Hat Security Advisory: kvm security update
Notes
Topic
Updated kvm packages that fix one security issue are now available for
Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.
Details
KVM (Kernel-based Virtual Machine) is a full virtualization solution for
Linux on AMD64 and Intel 64 systems. KVM is a Linux kernel module built
for the standard Red Hat Enterprise Linux kernel.
A flaw was found in the way QEMU handled VT100 terminal escape sequences
when emulating certain character devices. A guest user with privileges to
write to a character device that is emulated on the host using a virtual
console back-end could use this flaw to crash the qemu-kvm process on the
host or, possibly, escalate their privileges on the host. (CVE-2012-3515)
This flaw did not affect the default use of KVM. Affected configurations
were:
* When guests were started from the command line ("/usr/libexec/qemu-kvm"),
and without specifying a serial or parallel device that specifically does
not use a virtual console (vc) back-end. (Note that Red Hat does not
support invoking "qemu-kvm" from the command line on Red Hat Enterprise
Linux 5.)
* Guests that were managed via libvirt, such as when using Virtual Machine
Manager (virt-manager), but that have a serial or parallel device that uses
a virtual console back-end. By default, guests managed via libvirt will not
use a virtual console back-end for such devices.
Red Hat would like to thank the Xen project for reporting this issue.
All KVM users should upgrade to these updated packages, which correct this
issue. Note: The procedure in the Solution section must be performed before
this update will take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kvm packages that fix one security issue are now available for\nRed Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on AMD64 and Intel 64 systems. KVM is a Linux kernel module built\nfor the standard Red Hat Enterprise Linux kernel.\n\nA flaw was found in the way QEMU handled VT100 terminal escape sequences\nwhen emulating certain character devices. A guest user with privileges to\nwrite to a character device that is emulated on the host using a virtual\nconsole back-end could use this flaw to crash the qemu-kvm process on the\nhost or, possibly, escalate their privileges on the host. (CVE-2012-3515)\n\nThis flaw did not affect the default use of KVM. Affected configurations\nwere:\n\n* When guests were started from the command line (\"/usr/libexec/qemu-kvm\"),\nand without specifying a serial or parallel device that specifically does\nnot use a virtual console (vc) back-end. (Note that Red Hat does not\nsupport invoking \"qemu-kvm\" from the command line on Red Hat Enterprise\nLinux 5.)\n\n* Guests that were managed via libvirt, such as when using Virtual Machine\nManager (virt-manager), but that have a serial or parallel device that uses\na virtual console back-end. By default, guests managed via libvirt will not\nuse a virtual console back-end for such devices.\n\nRed Hat would like to thank the Xen project for reporting this issue.\n\nAll KVM users should upgrade to these updated packages, which correct this\nissue. Note: The procedure in the Solution section must be performed before\nthis update will take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:1235", "url": "https://access.redhat.com/errata/RHSA-2012:1235" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "851252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851252" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_1235.json" } ], "title": "Red Hat Security Advisory: kvm security update", "tracking": { "current_release_date": "2024-11-22T05:47:19+00:00", "generator": { "date": "2024-11-22T05:47:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2012:1235", "initial_release_date": "2012-09-05T16:43:00+00:00", "revision_history": [ { "date": "2012-09-05T16:43:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-09-05T16:45:53+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T05:47:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEL Desktop Multi OS (v. 5 client)", "product": { "name": "RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_virtualization:5::client" } } }, { "category": "product_name", "name": "RHEL Virtualization (v. 5 server)", "product": { "name": "RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_virtualization:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kvm-debuginfo-0:83-249.el5_8.5.x86_64", "product": { "name": "kvm-debuginfo-0:83-249.el5_8.5.x86_64", "product_id": "kvm-debuginfo-0:83-249.el5_8.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm-debuginfo@83-249.el5_8.5?arch=x86_64" } } }, { "category": "product_version", "name": "kvm-0:83-249.el5_8.5.x86_64", "product": { "name": "kvm-0:83-249.el5_8.5.x86_64", "product_id": "kvm-0:83-249.el5_8.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm@83-249.el5_8.5?arch=x86_64" } } }, { "category": "product_version", "name": "kmod-kvm-0:83-249.el5_8.5.x86_64", "product": { "name": "kmod-kvm-0:83-249.el5_8.5.x86_64", "product_id": "kmod-kvm-0:83-249.el5_8.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kmod-kvm@83-249.el5_8.5?arch=x86_64" } } }, { "category": "product_version", "name": "kmod-kvm-debug-0:83-249.el5_8.5.x86_64", "product": { "name": "kmod-kvm-debug-0:83-249.el5_8.5.x86_64", "product_id": "kmod-kvm-debug-0:83-249.el5_8.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kmod-kvm-debug@83-249.el5_8.5?arch=x86_64" } } }, { "category": "product_version", "name": "kvm-qemu-img-0:83-249.el5_8.5.x86_64", "product": { "name": "kvm-qemu-img-0:83-249.el5_8.5.x86_64", "product_id": "kvm-qemu-img-0:83-249.el5_8.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm-qemu-img@83-249.el5_8.5?arch=x86_64" } } }, { "category": "product_version", "name": "kvm-tools-0:83-249.el5_8.5.x86_64", "product": { "name": "kvm-tools-0:83-249.el5_8.5.x86_64", "product_id": "kvm-tools-0:83-249.el5_8.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm-tools@83-249.el5_8.5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kvm-0:83-249.el5_8.5.src", "product": { "name": "kvm-0:83-249.el5_8.5.src", "product_id": "kvm-0:83-249.el5_8.5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm@83-249.el5_8.5?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kmod-kvm-0:83-249.el5_8.5.x86_64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:kmod-kvm-0:83-249.el5_8.5.x86_64" }, "product_reference": "kmod-kvm-0:83-249.el5_8.5.x86_64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kmod-kvm-debug-0:83-249.el5_8.5.x86_64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:kmod-kvm-debug-0:83-249.el5_8.5.x86_64" }, "product_reference": "kmod-kvm-debug-0:83-249.el5_8.5.x86_64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0:83-249.el5_8.5.src as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:kvm-0:83-249.el5_8.5.src" }, "product_reference": "kvm-0:83-249.el5_8.5.src", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0:83-249.el5_8.5.x86_64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:kvm-0:83-249.el5_8.5.x86_64" }, "product_reference": "kvm-0:83-249.el5_8.5.x86_64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-debuginfo-0:83-249.el5_8.5.x86_64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:kvm-debuginfo-0:83-249.el5_8.5.x86_64" }, "product_reference": "kvm-debuginfo-0:83-249.el5_8.5.x86_64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-qemu-img-0:83-249.el5_8.5.x86_64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:kvm-qemu-img-0:83-249.el5_8.5.x86_64" }, "product_reference": "kvm-qemu-img-0:83-249.el5_8.5.x86_64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-tools-0:83-249.el5_8.5.x86_64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:kvm-tools-0:83-249.el5_8.5.x86_64" }, "product_reference": "kvm-tools-0:83-249.el5_8.5.x86_64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kmod-kvm-0:83-249.el5_8.5.x86_64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:kmod-kvm-0:83-249.el5_8.5.x86_64" }, "product_reference": "kmod-kvm-0:83-249.el5_8.5.x86_64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kmod-kvm-debug-0:83-249.el5_8.5.x86_64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:kmod-kvm-debug-0:83-249.el5_8.5.x86_64" }, "product_reference": "kmod-kvm-debug-0:83-249.el5_8.5.x86_64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0:83-249.el5_8.5.src as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:kvm-0:83-249.el5_8.5.src" }, "product_reference": "kvm-0:83-249.el5_8.5.src", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0:83-249.el5_8.5.x86_64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:kvm-0:83-249.el5_8.5.x86_64" }, "product_reference": "kvm-0:83-249.el5_8.5.x86_64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-debuginfo-0:83-249.el5_8.5.x86_64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:kvm-debuginfo-0:83-249.el5_8.5.x86_64" }, "product_reference": "kvm-debuginfo-0:83-249.el5_8.5.x86_64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-qemu-img-0:83-249.el5_8.5.x86_64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:kvm-qemu-img-0:83-249.el5_8.5.x86_64" }, "product_reference": "kvm-qemu-img-0:83-249.el5_8.5.x86_64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-tools-0:83-249.el5_8.5.x86_64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:kvm-tools-0:83-249.el5_8.5.x86_64" }, "product_reference": "kvm-tools-0:83-249.el5_8.5.x86_64", "relates_to_product_reference": "5Server-VT-5.8.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Xen project" ] } ], "cve": "CVE-2012-3515", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2012-08-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "851252" } ], "notes": [ { "category": "description", "text": "Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a \"device model\u0027s address space.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: VT100 emulation vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did affect the versions of xen package as shipped with Red Hat\nEnterprise Linux 5.\n\nThis issue did affect the versions of kvm package as shipped with Red Hat\nEnterprise Linux 5.\n\nThis issue did affect the versions of qemu-kvm package as shipped with Red Hat\nEnterprise Linux 6.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-VT-5.8.Z:kmod-kvm-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kmod-kvm-debug-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kvm-0:83-249.el5_8.5.src", "5Client-VT-5.8.Z:kvm-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kvm-debuginfo-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kvm-qemu-img-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kvm-tools-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kmod-kvm-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kmod-kvm-debug-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kvm-0:83-249.el5_8.5.src", "5Server-VT-5.8.Z:kvm-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kvm-debuginfo-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kvm-qemu-img-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kvm-tools-0:83-249.el5_8.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3515" }, { "category": "external", "summary": "RHBZ#851252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851252" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3515", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3515" } ], "release_date": "2012-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-05T16:43:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nThe following procedure must be performed before this update will take\neffect:\n\n1) Stop all KVM guest virtual machines.\n\n2) Either reboot the hypervisor machine or, as the root user, remove (using\n\"modprobe -r [module]\") and reload (using \"modprobe [module]\") all of the\nfollowing modules which are currently running (determined using \"lsmod\"):\nkvm, ksm, kvm-intel or kvm-amd.\n\n3) Restart the KVM guest virtual machines.", "product_ids": [ "5Client-VT-5.8.Z:kmod-kvm-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kmod-kvm-debug-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kvm-0:83-249.el5_8.5.src", "5Client-VT-5.8.Z:kvm-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kvm-debuginfo-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kvm-qemu-img-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kvm-tools-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kmod-kvm-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kmod-kvm-debug-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kvm-0:83-249.el5_8.5.src", "5Server-VT-5.8.Z:kvm-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kvm-debuginfo-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kvm-qemu-img-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kvm-tools-0:83-249.el5_8.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1235" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 7.4, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Client-VT-5.8.Z:kmod-kvm-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kmod-kvm-debug-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kvm-0:83-249.el5_8.5.src", "5Client-VT-5.8.Z:kvm-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kvm-debuginfo-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kvm-qemu-img-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kvm-tools-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kmod-kvm-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kmod-kvm-debug-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kvm-0:83-249.el5_8.5.src", "5Server-VT-5.8.Z:kvm-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kvm-debuginfo-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kvm-qemu-img-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kvm-tools-0:83-249.el5_8.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: VT100 emulation vulnerability" } ] }
rhsa-2012:1325
Vulnerability from csaf_redhat
Published
2012-10-02 17:09
Modified
2024-11-22 05:47
Summary
Red Hat Security Advisory: rhev-hypervisor6 security and bug fix update
Notes
Topic
An updated rhev-hypervisor6 package that fixes multiple security issues and
one bug is now available.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization
Hypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor
is a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes
everything necessary to run and manage virtual machines: A subset of the
Red Hat Enterprise Linux operating environment and the Red Hat Enterprise
Virtualization Agent.
Note: Red Hat Enterprise Virtualization Hypervisor is only available for
the Intel 64 and AMD64 architectures with virtualization extensions.
A flaw was found in the way QEMU handled VT100 terminal escape sequences
when emulating certain character devices. A guest user with privileges to
write to a character device that is emulated on the host using a virtual
console back-end could use this flaw to crash the qemu-kvm process on the
host or, possibly, escalate their privileges on the host. (CVE-2012-3515)
This flaw did not affect the default use of Red Hat Enterprise
Virtualization Hypervisor: it is not possible to add a device that uses a
virtual console back-end via Red Hat Enterprise Virtualization Manager.
To specify a virtual console back-end for a device and therefore be
vulnerable to this issue, the device would have to be created another way,
for example, by using a VDSM hook. Note that at this time hooks can only be
used on Red Hat Enterprise Linux hosts, not Red Hat Enterprise
Virtualization Hypervisor.
Multiple integer overflow flaws, leading to stack-based buffer overflows,
were found in glibc's functions for converting a string to a numeric
representation (strtod(), strtof(), and strtold()). If an application used
such a function on attacker controlled input, it could cause the
application to crash or, potentially, execute arbitrary code.
(CVE-2012-3480)
Red Hat would like to thank the Xen project for reporting the CVE-2012-3515
issue.
This updated package provides updated components that include fixes for
various security issues. These issues have no security impact on Red Hat
Enterprise Virtualization Hypervisor itself, however. The security fixes
included in this update address the following CVE numbers:
CVE-2012-4244 (bind issue)
CVE-2012-3524 (dbus issue)
CVE-2012-2313, CVE-2012-2384, CVE-2012-2390, CVE-2012-3430, and
CVE-2012-3552 (kernel issues)
CVE-2012-3445 (libvirt issue)
CVE-2011-3102 and CVE-2012-2807 (libxml2 issues)
CVE-2011-1202, CVE-2011-3970, CVE-2012-2825, CVE-2012-2870, CVE-2012-2871,
and CVE-2012-2893 (libxslt issues)
This updated Red Hat Enterprise Virtualization Hypervisor package also
fixes the following bug:
* Previously, the Manager listed all installed Hypervisor ISO images as
available even when they did not support the VDSM compatibility version
required by the selected host. The rhev-hypervisor6 package now maintains a
text file for each installed ISO image. The file lists the VDSM
compatibility versions supported by the relevant ISO image. The Manager
uses this information to ensure that only those Hypervisor ISO images that
are relevant to the selected host are listed. (BZ#856827)
Users of the Red Hat Enterprise Virtualization Hypervisor are advised to
upgrade to this updated package, which fixes these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated rhev-hypervisor6 package that fixes multiple security issues and\none bug is now available.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization\nHypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor\nis a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes\neverything necessary to run and manage virtual machines: A subset of the\nRed Hat Enterprise Linux operating environment and the Red Hat Enterprise\nVirtualization Agent.\n\nNote: Red Hat Enterprise Virtualization Hypervisor is only available for\nthe Intel 64 and AMD64 architectures with virtualization extensions.\n\nA flaw was found in the way QEMU handled VT100 terminal escape sequences\nwhen emulating certain character devices. A guest user with privileges to\nwrite to a character device that is emulated on the host using a virtual\nconsole back-end could use this flaw to crash the qemu-kvm process on the\nhost or, possibly, escalate their privileges on the host. (CVE-2012-3515)\n\nThis flaw did not affect the default use of Red Hat Enterprise\nVirtualization Hypervisor: it is not possible to add a device that uses a\nvirtual console back-end via Red Hat Enterprise Virtualization Manager.\n\nTo specify a virtual console back-end for a device and therefore be\nvulnerable to this issue, the device would have to be created another way,\nfor example, by using a VDSM hook. Note that at this time hooks can only be\nused on Red Hat Enterprise Linux hosts, not Red Hat Enterprise\nVirtualization Hypervisor.\n\nMultiple integer overflow flaws, leading to stack-based buffer overflows,\nwere found in glibc\u0027s functions for converting a string to a numeric\nrepresentation (strtod(), strtof(), and strtold()). If an application used\nsuch a function on attacker controlled input, it could cause the\napplication to crash or, potentially, execute arbitrary code.\n(CVE-2012-3480)\n\nRed Hat would like to thank the Xen project for reporting the CVE-2012-3515\nissue.\n\nThis updated package provides updated components that include fixes for\nvarious security issues. These issues have no security impact on Red Hat\nEnterprise Virtualization Hypervisor itself, however. The security fixes\nincluded in this update address the following CVE numbers:\n\nCVE-2012-4244 (bind issue)\n\nCVE-2012-3524 (dbus issue)\n\nCVE-2012-2313, CVE-2012-2384, CVE-2012-2390, CVE-2012-3430, and\nCVE-2012-3552 (kernel issues)\n\nCVE-2012-3445 (libvirt issue)\n\nCVE-2011-3102 and CVE-2012-2807 (libxml2 issues)\n\nCVE-2011-1202, CVE-2011-3970, CVE-2012-2825, CVE-2012-2870, CVE-2012-2871,\nand CVE-2012-2893 (libxslt issues)\n\nThis updated Red Hat Enterprise Virtualization Hypervisor package also\nfixes the following bug:\n\n* Previously, the Manager listed all installed Hypervisor ISO images as\navailable even when they did not support the VDSM compatibility version\nrequired by the selected host. The rhev-hypervisor6 package now maintains a\ntext file for each installed ISO image. The file lists the VDSM\ncompatibility versions supported by the relevant ISO image. The Manager\nuses this information to ensure that only those Hypervisor ISO images that\nare relevant to the selected host are listed. (BZ#856827)\n\nUsers of the Red Hat Enterprise Virtualization Hypervisor are advised to\nupgrade to this updated package, which fixes these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:1325", "url": "https://access.redhat.com/errata/RHSA-2012:1325" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/5/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "url": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/5/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html" }, { "category": "external", "summary": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "url": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html" }, { "category": "external", "summary": "847715", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=847715" }, { "category": "external", "summary": "851252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851252" }, { "category": "external", "summary": "856827", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=856827" }, { "category": "external", "summary": "856830", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=856830" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_1325.json" } ], "title": "Red Hat Security Advisory: rhev-hypervisor6 security and bug fix update", "tracking": { "current_release_date": "2024-11-22T05:47:27+00:00", "generator": { "date": "2024-11-22T05:47:27+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2012:1325", "initial_release_date": "2012-10-02T17:09:00+00:00", "revision_history": [ { "date": "2012-10-02T17:09:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-10-02T17:10:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T05:47:27+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEV Hypervisor for RHEL-6", "product": { "name": "RHEV Hypervisor for RHEL-6", "product_id": "6Server-RHEV-Hypervisor", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "rhev-hypervisor6-0:6.3-20120926.0.el6_3.noarch", "product": { "name": "rhev-hypervisor6-0:6.3-20120926.0.el6_3.noarch", "product_id": "rhev-hypervisor6-0:6.3-20120926.0.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhev-hypervisor6@6.3-20120926.0.el6_3?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhev-hypervisor6-0:6.3-20120926.0.el6_3.noarch as a component of RHEV Hypervisor for RHEL-6", "product_id": "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.3-20120926.0.el6_3.noarch" }, "product_reference": "rhev-hypervisor6-0:6.3-20120926.0.el6_3.noarch", "relates_to_product_reference": "6Server-RHEV-Hypervisor" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-3480", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "discovery_date": "2012-08-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "847715" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the (1) strtod, (2) strtof, (3) strtold, (4) strtod_l, and other unspecified \"related functions\" in stdlib in GNU C Library (aka glibc or libc6) 2.16 allow local users to cause a denial of service (application crash) and possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "glibc: Integer overflows, leading to stack-based buffer overflows in strto* related routines", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.3-20120926.0.el6_3.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3480" }, { "category": "external", "summary": "RHBZ#847715", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=847715" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3480", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3480" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3480", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3480" } ], "release_date": "2012-08-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-10-02T17:09:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization 2.2\nenvironments using the disk image provided by this package, refer to: \n\nhttps://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/5/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization 3.0\nenvironments using the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.3-20120926.0.el6_3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1325" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.3-20120926.0.el6_3.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "glibc: Integer overflows, leading to stack-based buffer overflows in strto* related routines" }, { "acknowledgments": [ { "names": [ "Xen project" ] } ], "cve": "CVE-2012-3515", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2012-08-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "851252" } ], "notes": [ { "category": "description", "text": "Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a \"device model\u0027s address space.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: VT100 emulation vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did affect the versions of xen package as shipped with Red Hat\nEnterprise Linux 5.\n\nThis issue did affect the versions of kvm package as shipped with Red Hat\nEnterprise Linux 5.\n\nThis issue did affect the versions of qemu-kvm package as shipped with Red Hat\nEnterprise Linux 6.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.3-20120926.0.el6_3.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3515" }, { "category": "external", "summary": "RHBZ#851252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851252" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3515", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3515" } ], "release_date": "2012-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-10-02T17:09:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization 2.2\nenvironments using the disk image provided by this package, refer to: \n\nhttps://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/5/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization 3.0\nenvironments using the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.3-20120926.0.el6_3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1325" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 7.4, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.3-20120926.0.el6_3.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: VT100 emulation vulnerability" } ] }
RHSA-2012:1234
Vulnerability from csaf_redhat
Published
2012-09-05 16:39
Modified
2024-11-22 05:47
Summary
Red Hat Security Advisory: qemu-kvm security update
Notes
Topic
Updated qemu-kvm packages that fix one security issue are now available for
Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.
Details
KVM (Kernel-based Virtual Machine) is a full virtualization solution for
Linux on AMD64 and Intel 64 systems. qemu-kvm is the user-space
component for running virtual machines using KVM.
A flaw was found in the way QEMU handled VT100 terminal escape sequences
when emulating certain character devices. A guest user with privileges to
write to a character device that is emulated on the host using a virtual
console back-end could use this flaw to crash the qemu-kvm process on the
host or, possibly, escalate their privileges on the host. (CVE-2012-3515)
This flaw did not affect the default use of KVM. Affected configurations
were:
* When guests were started from the command line ("/usr/libexec/qemu-kvm")
without the "-nodefaults" option, and also without specifying a
serial or parallel device, or a virtio-console device, that specifically
does not use a virtual console (vc) back-end. (Note that Red Hat does not
support invoking "qemu-kvm" from the command line without "-nodefaults" on
Red Hat Enterprise Linux 6.)
* Guests that were managed via libvirt, such as when using Virtual Machine
Manager (virt-manager), but that have a serial or parallel device, or a
virtio-console device, that uses a virtual console back-end. By default,
guests managed via libvirt will not use a virtual console back-end
for such devices.
Red Hat would like to thank the Xen project for reporting this issue.
All users of qemu-kvm should upgrade to these updated packages, which
resolve this issue. After installing this update, shut down all running
virtual machines. Once all virtual machines have shut down, start them
again for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated qemu-kvm packages that fix one security issue are now available for\nRed Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on AMD64 and Intel 64 systems. qemu-kvm is the user-space\ncomponent for running virtual machines using KVM.\n\nA flaw was found in the way QEMU handled VT100 terminal escape sequences\nwhen emulating certain character devices. A guest user with privileges to\nwrite to a character device that is emulated on the host using a virtual\nconsole back-end could use this flaw to crash the qemu-kvm process on the\nhost or, possibly, escalate their privileges on the host. (CVE-2012-3515)\n\nThis flaw did not affect the default use of KVM. Affected configurations\nwere:\n\n* When guests were started from the command line (\"/usr/libexec/qemu-kvm\")\nwithout the \"-nodefaults\" option, and also without specifying a\nserial or parallel device, or a virtio-console device, that specifically\ndoes not use a virtual console (vc) back-end. (Note that Red Hat does not\nsupport invoking \"qemu-kvm\" from the command line without \"-nodefaults\" on\nRed Hat Enterprise Linux 6.)\n\n* Guests that were managed via libvirt, such as when using Virtual Machine\nManager (virt-manager), but that have a serial or parallel device, or a\nvirtio-console device, that uses a virtual console back-end. By default,\nguests managed via libvirt will not use a virtual console back-end\nfor such devices.\n\nRed Hat would like to thank the Xen project for reporting this issue.\n\nAll users of qemu-kvm should upgrade to these updated packages, which\nresolve this issue. After installing this update, shut down all running\nvirtual machines. Once all virtual machines have shut down, start them\nagain for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:1234", "url": "https://access.redhat.com/errata/RHSA-2012:1234" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "851252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851252" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_1234.json" } ], "title": "Red Hat Security Advisory: qemu-kvm security update", "tracking": { "current_release_date": "2024-11-22T05:47:14+00:00", "generator": { "date": "2024-11-22T05:47:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2012:1234", "initial_release_date": "2012-09-05T16:39:00+00:00", "revision_history": [ { "date": "2012-09-05T16:39:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-09-05T16:46:06+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T05:47:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "product": { "name": "qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_id": "qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-tools@0.12.1.2-2.295.el6_3.2?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "product": { "name": "qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_id": "qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-img@0.12.1.2-2.295.el6_3.2?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "product": { "name": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_id": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm@0.12.1.2-2.295.el6_3.2?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "product": { "name": "qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_id": "qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-guest-agent@0.12.1.2-2.295.el6_3.2?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "product": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_id": "qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@0.12.1.2-2.295.el6_3.2?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "product": { "name": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "product_id": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm@0.12.1.2-2.295.el6_3.2?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Workstation-6.3.z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Xen project" ] } ], "cve": "CVE-2012-3515", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2012-08-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "851252" } ], "notes": [ { "category": "description", "text": "Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a \"device model\u0027s address space.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: VT100 emulation vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did affect the versions of xen package as shipped with Red Hat\nEnterprise Linux 5.\n\nThis issue did affect the versions of kvm package as shipped with Red Hat\nEnterprise Linux 5.\n\nThis issue did affect the versions of qemu-kvm package as shipped with Red Hat\nEnterprise Linux 6.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Client-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Client-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "6Client-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Client-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Client-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "6ComputeNode-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "6Server-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "6Workstation-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3515" }, { "category": "external", "summary": "RHBZ#851252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851252" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3515", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3515" } ], "release_date": "2012-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-05T16:39:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Client-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Client-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "6Client-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Client-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Client-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "6ComputeNode-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "6Server-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "6Workstation-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1234" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 7.4, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Client-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Client-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Client-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "6Client-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Client-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Client-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "6ComputeNode-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "6Server-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "6Workstation-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: VT100 emulation vulnerability" } ] }
RHSA-2012:1262
Vulnerability from csaf_redhat
Published
2012-09-13 16:48
Modified
2012-09-13 16:48
Summary
Red Hat Security Advisory: rhev-hypervisor5 security and bug fix update
Notes
Topic
An updated rhev-hypervisor5 package that fixes multiple security issues and
various bugs is now available.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
The rhev-hypervisor5 package provides a Red Hat Enterprise Virtualization
Hypervisor ISO disk image. The Red Hat Enterprise Virtualization
Hypervisor is a dedicated Kernel-based Virtual Machine (KVM) hypervisor.
It includes everything necessary to run and manage virtual machines: A
subset of the Red Hat Enterprise Linux operating environment and the Red
Hat Enterprise Virtualization Agent.
Note: Red Hat Enterprise Virtualization Hypervisor is only available for
the Intel 64 and AMD64 architectures with virtualization extensions.
A flaw was found in the way QEMU handled VT100 terminal escape sequences
when emulating certain character devices. A guest user with privileges to
write to a character device that is emulated on the host using a virtual
console back-end could use this flaw to crash the qemu-kvm process on the
host or, possibly, escalate their privileges on the host. (CVE-2012-3515)
Multiple integer overflow flaws, leading to stack-based buffer overflows,
were found in glibc's functions for converting a string to a numeric
representation (strtod(), strtof(), and strtold()). If an application used
such a function on attacker controlled input, it could cause the
application to crash or, potentially, execute arbitrary code.
(CVE-2012-3480)
Red Hat would like to thank the Xen project for reporting the CVE-2012-3515
issue.
This updated package provides updated components that include various bug
fixes, as well as a fix for CVE-2012-3515 in the xen package; however, for
this component, it had no security impact on Red Hat Enterprise
Virtualization Hypervisor itself.
Users of Red Hat Enterprise Virtualization Hypervisor are advised to
upgrade to this updated package, which fixes these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 2023 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated rhev-hypervisor5 package that fixes multiple security issues and\nvarious bugs is now available.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The rhev-hypervisor5 package provides a Red Hat Enterprise Virtualization\nHypervisor ISO disk image. The Red Hat Enterprise Virtualization\nHypervisor is a dedicated Kernel-based Virtual Machine (KVM) hypervisor.\nIt includes everything necessary to run and manage virtual machines: A\nsubset of the Red Hat Enterprise Linux operating environment and the Red\nHat Enterprise Virtualization Agent.\n\nNote: Red Hat Enterprise Virtualization Hypervisor is only available for\nthe Intel 64 and AMD64 architectures with virtualization extensions.\n\nA flaw was found in the way QEMU handled VT100 terminal escape sequences\nwhen emulating certain character devices. A guest user with privileges to\nwrite to a character device that is emulated on the host using a virtual\nconsole back-end could use this flaw to crash the qemu-kvm process on the\nhost or, possibly, escalate their privileges on the host. (CVE-2012-3515)\n\nMultiple integer overflow flaws, leading to stack-based buffer overflows,\nwere found in glibc\u0027s functions for converting a string to a numeric\nrepresentation (strtod(), strtof(), and strtold()). If an application used\nsuch a function on attacker controlled input, it could cause the\napplication to crash or, potentially, execute arbitrary code.\n(CVE-2012-3480)\n\nRed Hat would like to thank the Xen project for reporting the CVE-2012-3515\nissue.\n\nThis updated package provides updated components that include various bug\nfixes, as well as a fix for CVE-2012-3515 in the xen package; however, for\nthis component, it had no security impact on Red Hat Enterprise\nVirtualization Hypervisor itself.\n\nUsers of Red Hat Enterprise Virtualization Hypervisor are advised to\nupgrade to this updated package, which fixes these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:1262", "url": "https://access.redhat.com/errata/RHSA-2012:1262" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/5/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "url": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/5/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html" }, { "category": "external", "summary": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "url": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2012/rhsa-2012_1262.json" } ], "title": "Red Hat Security Advisory: rhev-hypervisor5 security and bug fix update", "tracking": { "current_release_date": "2012-09-13T16:48:00Z", "generator": { "date": "2023-06-30T20:40:00Z", "engine": { "name": "Red Hat SDEngine", "version": "3.18.0" } }, "id": "RHSA-2012:1262", "initial_release_date": "2012-09-13T16:48:00Z", "revision_history": [ { "date": "2012-09-13T16:48:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_family", "name": "Red Hat Virtualization", "product": { "name": "Red Hat Virtualization", "product_id": "Red Hat Virtualization" } } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-3480", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "discovery_date": "2012-08-13T00:00:00Z", "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=847715" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "Multiple integer overflows in the (1) strtod, (2) strtof, (3) strtold, (4) strtod_l, and other unspecified \"related functions\" in stdlib in GNU C Library (aka glibc or libc6) 2.16 allow local users to cause a denial of service (application crash) and possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "glibc: Integer overflows, leading to stack-based buffer overflows in strto* related routines", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Virtualization" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3480", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3480" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3480", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3480" }, { "category": "external", "summary": "CVE-2012-3480", "url": "https://access.redhat.com/security/cve/CVE-2012-3480" }, { "category": "external", "summary": "bz#847715: CVE-2012-3480 glibc: Integer overflows, leading to stack-based buffer overflows in strto* related routines", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=847715" } ], "release_date": "2012-08-12T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization\n2.2 environments using the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/5/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization\n3.0 environments using the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "Red Hat Virtualization" ], "url": "https://access.redhat.com/errata/RHSA-2012:1262" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "availabilityRequirement": "NOT_DEFINED", "baseScore": 4.4, "collateralDamagePotential": "NOT_DEFINED", "confidentialityImpact": "PARTIAL", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 0.0, "exploitability": "NOT_DEFINED", "integrityImpact": "PARTIAL", "integrityRequirement": "NOT_DEFINED", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "targetDistribution": "NOT_DEFINED", "temporalScore": 0.0, "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat Virtualization" ] } ], "threats": [ { "category": "impact", "date": "2012-08-13T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2012-3480 glibc: Integer overflows, leading to stack-based buffer overflows in strto* related routines" }, { "acknowledgments": [ { "names": [ "Xen project" ] } ], "cve": "CVE-2012-3515", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2012-08-23T00:00:00Z", "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=851252" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a \"device model\u0027s address space.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "VT100 emulation vulnerability", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Virtualization" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3515", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3515" }, { "category": "external", "summary": "CVE-2012-3515", "url": "https://access.redhat.com/security/cve/CVE-2012-3515" }, { "category": "external", "summary": "bz#851252: VT100 emulation vulnerability", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851252" } ], "release_date": "2012-09-05T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization\n2.2 environments using the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/5/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization\n3.0 environments using the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "Red Hat Virtualization" ], "url": "https://access.redhat.com/errata/RHSA-2012:1262" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "availabilityRequirement": "NOT_DEFINED", "baseScore": 7.4, "collateralDamagePotential": "NOT_DEFINED", "confidentialityImpact": "COMPLETE", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 0.0, "exploitability": "NOT_DEFINED", "integrityImpact": "COMPLETE", "integrityRequirement": "NOT_DEFINED", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "targetDistribution": "NOT_DEFINED", "temporalScore": 0.0, "vectorString": "AV:A/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "Red Hat Virtualization" ] } ], "threats": [ { "category": "impact", "date": "2012-08-23T00:00:00Z", "details": "Important" } ], "title": "VT100 emulation vulnerability" } ] }
rhsa-2012:1262
Vulnerability from csaf_redhat
Published
2012-09-13 16:48
Modified
2012-09-13 16:48
Summary
Red Hat Security Advisory: rhev-hypervisor5 security and bug fix update
Notes
Topic
An updated rhev-hypervisor5 package that fixes multiple security issues and
various bugs is now available.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
The rhev-hypervisor5 package provides a Red Hat Enterprise Virtualization
Hypervisor ISO disk image. The Red Hat Enterprise Virtualization
Hypervisor is a dedicated Kernel-based Virtual Machine (KVM) hypervisor.
It includes everything necessary to run and manage virtual machines: A
subset of the Red Hat Enterprise Linux operating environment and the Red
Hat Enterprise Virtualization Agent.
Note: Red Hat Enterprise Virtualization Hypervisor is only available for
the Intel 64 and AMD64 architectures with virtualization extensions.
A flaw was found in the way QEMU handled VT100 terminal escape sequences
when emulating certain character devices. A guest user with privileges to
write to a character device that is emulated on the host using a virtual
console back-end could use this flaw to crash the qemu-kvm process on the
host or, possibly, escalate their privileges on the host. (CVE-2012-3515)
Multiple integer overflow flaws, leading to stack-based buffer overflows,
were found in glibc's functions for converting a string to a numeric
representation (strtod(), strtof(), and strtold()). If an application used
such a function on attacker controlled input, it could cause the
application to crash or, potentially, execute arbitrary code.
(CVE-2012-3480)
Red Hat would like to thank the Xen project for reporting the CVE-2012-3515
issue.
This updated package provides updated components that include various bug
fixes, as well as a fix for CVE-2012-3515 in the xen package; however, for
this component, it had no security impact on Red Hat Enterprise
Virtualization Hypervisor itself.
Users of Red Hat Enterprise Virtualization Hypervisor are advised to
upgrade to this updated package, which fixes these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 2023 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated rhev-hypervisor5 package that fixes multiple security issues and\nvarious bugs is now available.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The rhev-hypervisor5 package provides a Red Hat Enterprise Virtualization\nHypervisor ISO disk image. The Red Hat Enterprise Virtualization\nHypervisor is a dedicated Kernel-based Virtual Machine (KVM) hypervisor.\nIt includes everything necessary to run and manage virtual machines: A\nsubset of the Red Hat Enterprise Linux operating environment and the Red\nHat Enterprise Virtualization Agent.\n\nNote: Red Hat Enterprise Virtualization Hypervisor is only available for\nthe Intel 64 and AMD64 architectures with virtualization extensions.\n\nA flaw was found in the way QEMU handled VT100 terminal escape sequences\nwhen emulating certain character devices. A guest user with privileges to\nwrite to a character device that is emulated on the host using a virtual\nconsole back-end could use this flaw to crash the qemu-kvm process on the\nhost or, possibly, escalate their privileges on the host. (CVE-2012-3515)\n\nMultiple integer overflow flaws, leading to stack-based buffer overflows,\nwere found in glibc\u0027s functions for converting a string to a numeric\nrepresentation (strtod(), strtof(), and strtold()). If an application used\nsuch a function on attacker controlled input, it could cause the\napplication to crash or, potentially, execute arbitrary code.\n(CVE-2012-3480)\n\nRed Hat would like to thank the Xen project for reporting the CVE-2012-3515\nissue.\n\nThis updated package provides updated components that include various bug\nfixes, as well as a fix for CVE-2012-3515 in the xen package; however, for\nthis component, it had no security impact on Red Hat Enterprise\nVirtualization Hypervisor itself.\n\nUsers of Red Hat Enterprise Virtualization Hypervisor are advised to\nupgrade to this updated package, which fixes these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:1262", "url": "https://access.redhat.com/errata/RHSA-2012:1262" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/5/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "url": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/5/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html" }, { "category": "external", "summary": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "url": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2012/rhsa-2012_1262.json" } ], "title": "Red Hat Security Advisory: rhev-hypervisor5 security and bug fix update", "tracking": { "current_release_date": "2012-09-13T16:48:00Z", "generator": { "date": "2023-06-30T20:40:00Z", "engine": { "name": "Red Hat SDEngine", "version": "3.18.0" } }, "id": "RHSA-2012:1262", "initial_release_date": "2012-09-13T16:48:00Z", "revision_history": [ { "date": "2012-09-13T16:48:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_family", "name": "Red Hat Virtualization", "product": { "name": "Red Hat Virtualization", "product_id": "Red Hat Virtualization" } } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-3480", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "discovery_date": "2012-08-13T00:00:00Z", "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=847715" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "Multiple integer overflows in the (1) strtod, (2) strtof, (3) strtold, (4) strtod_l, and other unspecified \"related functions\" in stdlib in GNU C Library (aka glibc or libc6) 2.16 allow local users to cause a denial of service (application crash) and possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "glibc: Integer overflows, leading to stack-based buffer overflows in strto* related routines", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Virtualization" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3480", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3480" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3480", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3480" }, { "category": "external", "summary": "CVE-2012-3480", "url": "https://access.redhat.com/security/cve/CVE-2012-3480" }, { "category": "external", "summary": "bz#847715: CVE-2012-3480 glibc: Integer overflows, leading to stack-based buffer overflows in strto* related routines", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=847715" } ], "release_date": "2012-08-12T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization\n2.2 environments using the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/5/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization\n3.0 environments using the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "Red Hat Virtualization" ], "url": "https://access.redhat.com/errata/RHSA-2012:1262" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "availabilityRequirement": "NOT_DEFINED", "baseScore": 4.4, "collateralDamagePotential": "NOT_DEFINED", "confidentialityImpact": "PARTIAL", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 0.0, "exploitability": "NOT_DEFINED", "integrityImpact": "PARTIAL", "integrityRequirement": "NOT_DEFINED", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "targetDistribution": "NOT_DEFINED", "temporalScore": 0.0, "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat Virtualization" ] } ], "threats": [ { "category": "impact", "date": "2012-08-13T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2012-3480 glibc: Integer overflows, leading to stack-based buffer overflows in strto* related routines" }, { "acknowledgments": [ { "names": [ "Xen project" ] } ], "cve": "CVE-2012-3515", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2012-08-23T00:00:00Z", "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=851252" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a \"device model\u0027s address space.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "VT100 emulation vulnerability", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Virtualization" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3515", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3515" }, { "category": "external", "summary": "CVE-2012-3515", "url": "https://access.redhat.com/security/cve/CVE-2012-3515" }, { "category": "external", "summary": "bz#851252: VT100 emulation vulnerability", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851252" } ], "release_date": "2012-09-05T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization\n2.2 environments using the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/5/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization\n3.0 environments using the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "Red Hat Virtualization" ], "url": "https://access.redhat.com/errata/RHSA-2012:1262" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "availabilityRequirement": "NOT_DEFINED", "baseScore": 7.4, "collateralDamagePotential": "NOT_DEFINED", "confidentialityImpact": "COMPLETE", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 0.0, "exploitability": "NOT_DEFINED", "integrityImpact": "COMPLETE", "integrityRequirement": "NOT_DEFINED", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "targetDistribution": "NOT_DEFINED", "temporalScore": 0.0, "vectorString": "AV:A/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "Red Hat Virtualization" ] } ], "threats": [ { "category": "impact", "date": "2012-08-23T00:00:00Z", "details": "Important" } ], "title": "VT100 emulation vulnerability" } ] }
rhsa-2012_1233
Vulnerability from csaf_redhat
Published
2012-09-05 16:31
Modified
2024-11-22 05:47
Summary
Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update
Notes
Topic
Updated qemu-kvm-rhev packages that fix one security issue and two bugs are
now available for Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.
Details
KVM (Kernel-based Virtual Machine) is a full virtualization solution for
Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev packages form the
user-space component for running virtual machines using KVM.
A flaw was found in the way QEMU handled VT100 terminal escape sequences
when emulating certain character devices. A guest user with privileges to
write to a character device that is emulated on the host using a virtual
console back-end could use this flaw to crash the qemu-kvm process on the
host or, possibly, escalate their privileges on the host. (CVE-2012-3515)
When using qemu-kvm-rhev on a Red Hat Enterprise Linux 6 host not managed
by Red Hat Enterprise Virtualization:
* This flaw did not affect the default use of KVM. Affected configurations
were:
- When guests were started from the command line ("/usr/libexec/qemu-kvm")
without the "-nodefaults" option, and also without specifying a
serial or parallel device, or a virtio-console device, that specifically
does not use a virtual console (vc) back-end. (Note that Red Hat does not
support invoking "qemu-kvm" from the command line without "-nodefaults" on
Red Hat Enterprise Linux 6.)
- Guests that were managed via libvirt, such as when using Virtual Machine
Manager (virt-manager), but that have a serial or parallel device, or a
virtio-console device, that uses a virtual console back-end. By default,
guests managed via libvirt will not use a virtual console back-end for such
devices.
When using qemu-kvm-rhev on a Red Hat Enterprise Virtualization managed Red
Hat Enterprise Linux 6 host:
* This flaw did not affect the default use of a Red Hat Enterprise
Virtualization host: it is not possible to add a device that uses a virtual
console back-end via Red Hat Enterprise Virtualization Manager.
To specify a virtual console back-end for a device and therefore be
vulnerable to this issue, the device would have to be created another way,
for example, by using a VDSM hook.
Red Hat would like to thank the Xen project for reporting this issue.
This update also fixes the following bugs:
* Previously, the KVM modules were not loaded by the postinstall scriptlet
of RPM scripts. This bug caused various issues and required the system to
be rebooted to resolve them. With this update, the modules are loaded
properly by the scriptlet and no unnecessary reboots are now required.
(BZ#839897)
* Previously, when a guest was started up with two serial devices, qemu-kvm
returned an error message and terminated the boot because IRQ 4 for the ISA
bus was being used by both devices. This update fixes the qemu-kvm code,
which allows IRQ 4 to be used by more than one device on the ISA bus, and
the boot now succeeds in the described scenario. (BZ#840054)
All users of qemu-kvm-rhev are advised to upgrade to these updated
packages, which fix these issues. After installing this update, shut down
all running virtual machines. Once all virtual machines have shut down,
start them again for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated qemu-kvm-rhev packages that fix one security issue and two bugs are\nnow available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on AMD64 and Intel 64 systems. The qemu-kvm-rhev packages form the\nuser-space component for running virtual machines using KVM.\n\nA flaw was found in the way QEMU handled VT100 terminal escape sequences\nwhen emulating certain character devices. A guest user with privileges to\nwrite to a character device that is emulated on the host using a virtual\nconsole back-end could use this flaw to crash the qemu-kvm process on the\nhost or, possibly, escalate their privileges on the host. (CVE-2012-3515)\n\nWhen using qemu-kvm-rhev on a Red Hat Enterprise Linux 6 host not managed\nby Red Hat Enterprise Virtualization:\n\n* This flaw did not affect the default use of KVM. Affected configurations\nwere:\n\n- When guests were started from the command line (\"/usr/libexec/qemu-kvm\")\nwithout the \"-nodefaults\" option, and also without specifying a\nserial or parallel device, or a virtio-console device, that specifically\ndoes not use a virtual console (vc) back-end. (Note that Red Hat does not\nsupport invoking \"qemu-kvm\" from the command line without \"-nodefaults\" on\nRed Hat Enterprise Linux 6.)\n\n- Guests that were managed via libvirt, such as when using Virtual Machine\nManager (virt-manager), but that have a serial or parallel device, or a\nvirtio-console device, that uses a virtual console back-end. By default,\nguests managed via libvirt will not use a virtual console back-end for such\ndevices.\n\nWhen using qemu-kvm-rhev on a Red Hat Enterprise Virtualization managed Red\nHat Enterprise Linux 6 host:\n\n* This flaw did not affect the default use of a Red Hat Enterprise\nVirtualization host: it is not possible to add a device that uses a virtual\nconsole back-end via Red Hat Enterprise Virtualization Manager.\n\nTo specify a virtual console back-end for a device and therefore be\nvulnerable to this issue, the device would have to be created another way,\nfor example, by using a VDSM hook.\n\nRed Hat would like to thank the Xen project for reporting this issue.\n\nThis update also fixes the following bugs:\n\n* Previously, the KVM modules were not loaded by the postinstall scriptlet\nof RPM scripts. This bug caused various issues and required the system to\nbe rebooted to resolve them. With this update, the modules are loaded\nproperly by the scriptlet and no unnecessary reboots are now required.\n(BZ#839897)\n\n* Previously, when a guest was started up with two serial devices, qemu-kvm\nreturned an error message and terminated the boot because IRQ 4 for the ISA\nbus was being used by both devices. This update fixes the qemu-kvm code,\nwhich allows IRQ 4 to be used by more than one device on the ISA bus, and\nthe boot now succeeds in the described scenario. (BZ#840054)\n\nAll users of qemu-kvm-rhev are advised to upgrade to these updated\npackages, which fix these issues. After installing this update, shut down\nall running virtual machines. Once all virtual machines have shut down,\nstart them again for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:1233", "url": "https://access.redhat.com/errata/RHSA-2012:1233" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "851252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851252" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_1233.json" } ], "title": "Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update", "tracking": { "current_release_date": "2024-11-22T05:47:10+00:00", "generator": { "date": "2024-11-22T05:47:10+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2012:1233", "initial_release_date": "2012-09-05T16:31:00+00:00", "revision_history": [ { "date": "2012-09-05T16:31:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-09-05T16:35:45+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T05:47:10+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEV Agents (vdsm)", "product": { "name": "RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:6::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.src", "product": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.src", "product_id": "qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@0.12.1.2-2.295.el6_3.2?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "product": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_id": "qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@0.12.1.2-2.295.el6_3.2?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-img-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "product": { "name": "qemu-img-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_id": "qemu-img-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-img-rhev@0.12.1.2-2.295.el6_3.2?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "product": { "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_id": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@0.12.1.2-2.295.el6_3.2?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "product": { "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_id": "qemu-kvm-rhev-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev-tools@0.12.1.2-2.295.el6_3.2?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "qemu-img-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents:qemu-img-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-img-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Server-RHEV-Agents" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.src as a component of RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.src" }, "product_reference": "qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.src", "relates_to_product_reference": "6Server-RHEV-Agents" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Server-RHEV-Agents" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Server-RHEV-Agents" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of RHEV Agents (vdsm)", "product_id": "6Server-RHEV-Agents:qemu-kvm-rhev-tools-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-rhev-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Server-RHEV-Agents" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Xen project" ] } ], "cve": "CVE-2012-3515", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2012-08-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "851252" } ], "notes": [ { "category": "description", "text": "Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a \"device model\u0027s address space.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: VT100 emulation vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did affect the versions of xen package as shipped with Red Hat\nEnterprise Linux 5.\n\nThis issue did affect the versions of kvm package as shipped with Red Hat\nEnterprise Linux 5.\n\nThis issue did affect the versions of qemu-kvm package as shipped with Red Hat\nEnterprise Linux 6.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Agents:qemu-img-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.src", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-tools-2:0.12.1.2-2.295.el6_3.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3515" }, { "category": "external", "summary": "RHBZ#851252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851252" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3515", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3515" } ], "release_date": "2012-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-05T16:31:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Server-RHEV-Agents:qemu-img-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.src", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-tools-2:0.12.1.2-2.295.el6_3.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1233" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 7.4, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Server-RHEV-Agents:qemu-img-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.src", "6Server-RHEV-Agents:qemu-kvm-rhev-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-RHEV-Agents:qemu-kvm-rhev-tools-2:0.12.1.2-2.295.el6_3.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: VT100 emulation vulnerability" } ] }
rhsa-2012:1234
Vulnerability from csaf_redhat
Published
2012-09-05 16:39
Modified
2024-11-22 05:47
Summary
Red Hat Security Advisory: qemu-kvm security update
Notes
Topic
Updated qemu-kvm packages that fix one security issue are now available for
Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.
Details
KVM (Kernel-based Virtual Machine) is a full virtualization solution for
Linux on AMD64 and Intel 64 systems. qemu-kvm is the user-space
component for running virtual machines using KVM.
A flaw was found in the way QEMU handled VT100 terminal escape sequences
when emulating certain character devices. A guest user with privileges to
write to a character device that is emulated on the host using a virtual
console back-end could use this flaw to crash the qemu-kvm process on the
host or, possibly, escalate their privileges on the host. (CVE-2012-3515)
This flaw did not affect the default use of KVM. Affected configurations
were:
* When guests were started from the command line ("/usr/libexec/qemu-kvm")
without the "-nodefaults" option, and also without specifying a
serial or parallel device, or a virtio-console device, that specifically
does not use a virtual console (vc) back-end. (Note that Red Hat does not
support invoking "qemu-kvm" from the command line without "-nodefaults" on
Red Hat Enterprise Linux 6.)
* Guests that were managed via libvirt, such as when using Virtual Machine
Manager (virt-manager), but that have a serial or parallel device, or a
virtio-console device, that uses a virtual console back-end. By default,
guests managed via libvirt will not use a virtual console back-end
for such devices.
Red Hat would like to thank the Xen project for reporting this issue.
All users of qemu-kvm should upgrade to these updated packages, which
resolve this issue. After installing this update, shut down all running
virtual machines. Once all virtual machines have shut down, start them
again for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated qemu-kvm packages that fix one security issue are now available for\nRed Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on AMD64 and Intel 64 systems. qemu-kvm is the user-space\ncomponent for running virtual machines using KVM.\n\nA flaw was found in the way QEMU handled VT100 terminal escape sequences\nwhen emulating certain character devices. A guest user with privileges to\nwrite to a character device that is emulated on the host using a virtual\nconsole back-end could use this flaw to crash the qemu-kvm process on the\nhost or, possibly, escalate their privileges on the host. (CVE-2012-3515)\n\nThis flaw did not affect the default use of KVM. Affected configurations\nwere:\n\n* When guests were started from the command line (\"/usr/libexec/qemu-kvm\")\nwithout the \"-nodefaults\" option, and also without specifying a\nserial or parallel device, or a virtio-console device, that specifically\ndoes not use a virtual console (vc) back-end. (Note that Red Hat does not\nsupport invoking \"qemu-kvm\" from the command line without \"-nodefaults\" on\nRed Hat Enterprise Linux 6.)\n\n* Guests that were managed via libvirt, such as when using Virtual Machine\nManager (virt-manager), but that have a serial or parallel device, or a\nvirtio-console device, that uses a virtual console back-end. By default,\nguests managed via libvirt will not use a virtual console back-end\nfor such devices.\n\nRed Hat would like to thank the Xen project for reporting this issue.\n\nAll users of qemu-kvm should upgrade to these updated packages, which\nresolve this issue. After installing this update, shut down all running\nvirtual machines. Once all virtual machines have shut down, start them\nagain for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:1234", "url": "https://access.redhat.com/errata/RHSA-2012:1234" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "851252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851252" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_1234.json" } ], "title": "Red Hat Security Advisory: qemu-kvm security update", "tracking": { "current_release_date": "2024-11-22T05:47:14+00:00", "generator": { "date": "2024-11-22T05:47:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2012:1234", "initial_release_date": "2012-09-05T16:39:00+00:00", "revision_history": [ { "date": "2012-09-05T16:39:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-09-05T16:46:06+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T05:47:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "product": { "name": "qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_id": "qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-tools@0.12.1.2-2.295.el6_3.2?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "product": { "name": "qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_id": "qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-img@0.12.1.2-2.295.el6_3.2?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "product": { "name": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_id": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm@0.12.1.2-2.295.el6_3.2?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "product": { "name": "qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_id": "qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-guest-agent@0.12.1.2-2.295.el6_3.2?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "product": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_id": "qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@0.12.1.2-2.295.el6_3.2?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "product": { "name": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "product_id": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm@0.12.1.2-2.295.el6_3.2?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64" }, "product_reference": "qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "relates_to_product_reference": "6Workstation-6.3.z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Xen project" ] } ], "cve": "CVE-2012-3515", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2012-08-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "851252" } ], "notes": [ { "category": "description", "text": "Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a \"device model\u0027s address space.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: VT100 emulation vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did affect the versions of xen package as shipped with Red Hat\nEnterprise Linux 5.\n\nThis issue did affect the versions of kvm package as shipped with Red Hat\nEnterprise Linux 5.\n\nThis issue did affect the versions of qemu-kvm package as shipped with Red Hat\nEnterprise Linux 6.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Client-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Client-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "6Client-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Client-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Client-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "6ComputeNode-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "6Server-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "6Workstation-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3515" }, { "category": "external", "summary": "RHBZ#851252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851252" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3515", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3515" } ], "release_date": "2012-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-05T16:39:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Client-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Client-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "6Client-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Client-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Client-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "6ComputeNode-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "6Server-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "6Workstation-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1234" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 7.4, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Client-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Client-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Client-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "6Client-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Client-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Client-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "6ComputeNode-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6ComputeNode-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "6Server-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Server-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-guest-agent-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-img-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.src", "6Workstation-6.3.z:qemu-kvm-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-kvm-debuginfo-2:0.12.1.2-2.295.el6_3.2.x86_64", "6Workstation-6.3.z:qemu-kvm-tools-2:0.12.1.2-2.295.el6_3.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: VT100 emulation vulnerability" } ] }
rhsa-2012_1235
Vulnerability from csaf_redhat
Published
2012-09-05 16:43
Modified
2024-11-22 05:47
Summary
Red Hat Security Advisory: kvm security update
Notes
Topic
Updated kvm packages that fix one security issue are now available for
Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.
Details
KVM (Kernel-based Virtual Machine) is a full virtualization solution for
Linux on AMD64 and Intel 64 systems. KVM is a Linux kernel module built
for the standard Red Hat Enterprise Linux kernel.
A flaw was found in the way QEMU handled VT100 terminal escape sequences
when emulating certain character devices. A guest user with privileges to
write to a character device that is emulated on the host using a virtual
console back-end could use this flaw to crash the qemu-kvm process on the
host or, possibly, escalate their privileges on the host. (CVE-2012-3515)
This flaw did not affect the default use of KVM. Affected configurations
were:
* When guests were started from the command line ("/usr/libexec/qemu-kvm"),
and without specifying a serial or parallel device that specifically does
not use a virtual console (vc) back-end. (Note that Red Hat does not
support invoking "qemu-kvm" from the command line on Red Hat Enterprise
Linux 5.)
* Guests that were managed via libvirt, such as when using Virtual Machine
Manager (virt-manager), but that have a serial or parallel device that uses
a virtual console back-end. By default, guests managed via libvirt will not
use a virtual console back-end for such devices.
Red Hat would like to thank the Xen project for reporting this issue.
All KVM users should upgrade to these updated packages, which correct this
issue. Note: The procedure in the Solution section must be performed before
this update will take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kvm packages that fix one security issue are now available for\nRed Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on AMD64 and Intel 64 systems. KVM is a Linux kernel module built\nfor the standard Red Hat Enterprise Linux kernel.\n\nA flaw was found in the way QEMU handled VT100 terminal escape sequences\nwhen emulating certain character devices. A guest user with privileges to\nwrite to a character device that is emulated on the host using a virtual\nconsole back-end could use this flaw to crash the qemu-kvm process on the\nhost or, possibly, escalate their privileges on the host. (CVE-2012-3515)\n\nThis flaw did not affect the default use of KVM. Affected configurations\nwere:\n\n* When guests were started from the command line (\"/usr/libexec/qemu-kvm\"),\nand without specifying a serial or parallel device that specifically does\nnot use a virtual console (vc) back-end. (Note that Red Hat does not\nsupport invoking \"qemu-kvm\" from the command line on Red Hat Enterprise\nLinux 5.)\n\n* Guests that were managed via libvirt, such as when using Virtual Machine\nManager (virt-manager), but that have a serial or parallel device that uses\na virtual console back-end. By default, guests managed via libvirt will not\nuse a virtual console back-end for such devices.\n\nRed Hat would like to thank the Xen project for reporting this issue.\n\nAll KVM users should upgrade to these updated packages, which correct this\nissue. Note: The procedure in the Solution section must be performed before\nthis update will take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:1235", "url": "https://access.redhat.com/errata/RHSA-2012:1235" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "851252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851252" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_1235.json" } ], "title": "Red Hat Security Advisory: kvm security update", "tracking": { "current_release_date": "2024-11-22T05:47:19+00:00", "generator": { "date": "2024-11-22T05:47:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2012:1235", "initial_release_date": "2012-09-05T16:43:00+00:00", "revision_history": [ { "date": "2012-09-05T16:43:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-09-05T16:45:53+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T05:47:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEL Desktop Multi OS (v. 5 client)", "product": { "name": "RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_virtualization:5::client" } } }, { "category": "product_name", "name": "RHEL Virtualization (v. 5 server)", "product": { "name": "RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_virtualization:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kvm-debuginfo-0:83-249.el5_8.5.x86_64", "product": { "name": "kvm-debuginfo-0:83-249.el5_8.5.x86_64", "product_id": "kvm-debuginfo-0:83-249.el5_8.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm-debuginfo@83-249.el5_8.5?arch=x86_64" } } }, { "category": "product_version", "name": "kvm-0:83-249.el5_8.5.x86_64", "product": { "name": "kvm-0:83-249.el5_8.5.x86_64", "product_id": "kvm-0:83-249.el5_8.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm@83-249.el5_8.5?arch=x86_64" } } }, { "category": "product_version", "name": "kmod-kvm-0:83-249.el5_8.5.x86_64", "product": { "name": "kmod-kvm-0:83-249.el5_8.5.x86_64", "product_id": "kmod-kvm-0:83-249.el5_8.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kmod-kvm@83-249.el5_8.5?arch=x86_64" } } }, { "category": "product_version", "name": "kmod-kvm-debug-0:83-249.el5_8.5.x86_64", "product": { "name": "kmod-kvm-debug-0:83-249.el5_8.5.x86_64", "product_id": "kmod-kvm-debug-0:83-249.el5_8.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kmod-kvm-debug@83-249.el5_8.5?arch=x86_64" } } }, { "category": "product_version", "name": "kvm-qemu-img-0:83-249.el5_8.5.x86_64", "product": { "name": "kvm-qemu-img-0:83-249.el5_8.5.x86_64", "product_id": "kvm-qemu-img-0:83-249.el5_8.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm-qemu-img@83-249.el5_8.5?arch=x86_64" } } }, { "category": "product_version", "name": "kvm-tools-0:83-249.el5_8.5.x86_64", "product": { "name": "kvm-tools-0:83-249.el5_8.5.x86_64", "product_id": "kvm-tools-0:83-249.el5_8.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm-tools@83-249.el5_8.5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kvm-0:83-249.el5_8.5.src", "product": { "name": "kvm-0:83-249.el5_8.5.src", "product_id": "kvm-0:83-249.el5_8.5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kvm@83-249.el5_8.5?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kmod-kvm-0:83-249.el5_8.5.x86_64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:kmod-kvm-0:83-249.el5_8.5.x86_64" }, "product_reference": "kmod-kvm-0:83-249.el5_8.5.x86_64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kmod-kvm-debug-0:83-249.el5_8.5.x86_64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:kmod-kvm-debug-0:83-249.el5_8.5.x86_64" }, "product_reference": "kmod-kvm-debug-0:83-249.el5_8.5.x86_64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0:83-249.el5_8.5.src as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:kvm-0:83-249.el5_8.5.src" }, "product_reference": "kvm-0:83-249.el5_8.5.src", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0:83-249.el5_8.5.x86_64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:kvm-0:83-249.el5_8.5.x86_64" }, "product_reference": "kvm-0:83-249.el5_8.5.x86_64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-debuginfo-0:83-249.el5_8.5.x86_64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:kvm-debuginfo-0:83-249.el5_8.5.x86_64" }, "product_reference": "kvm-debuginfo-0:83-249.el5_8.5.x86_64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-qemu-img-0:83-249.el5_8.5.x86_64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:kvm-qemu-img-0:83-249.el5_8.5.x86_64" }, "product_reference": "kvm-qemu-img-0:83-249.el5_8.5.x86_64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-tools-0:83-249.el5_8.5.x86_64 as a component of RHEL Desktop Multi OS (v. 5 client)", "product_id": "5Client-VT-5.8.Z:kvm-tools-0:83-249.el5_8.5.x86_64" }, "product_reference": "kvm-tools-0:83-249.el5_8.5.x86_64", "relates_to_product_reference": "5Client-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kmod-kvm-0:83-249.el5_8.5.x86_64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:kmod-kvm-0:83-249.el5_8.5.x86_64" }, "product_reference": "kmod-kvm-0:83-249.el5_8.5.x86_64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kmod-kvm-debug-0:83-249.el5_8.5.x86_64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:kmod-kvm-debug-0:83-249.el5_8.5.x86_64" }, "product_reference": "kmod-kvm-debug-0:83-249.el5_8.5.x86_64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0:83-249.el5_8.5.src as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:kvm-0:83-249.el5_8.5.src" }, "product_reference": "kvm-0:83-249.el5_8.5.src", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-0:83-249.el5_8.5.x86_64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:kvm-0:83-249.el5_8.5.x86_64" }, "product_reference": "kvm-0:83-249.el5_8.5.x86_64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-debuginfo-0:83-249.el5_8.5.x86_64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:kvm-debuginfo-0:83-249.el5_8.5.x86_64" }, "product_reference": "kvm-debuginfo-0:83-249.el5_8.5.x86_64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-qemu-img-0:83-249.el5_8.5.x86_64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:kvm-qemu-img-0:83-249.el5_8.5.x86_64" }, "product_reference": "kvm-qemu-img-0:83-249.el5_8.5.x86_64", "relates_to_product_reference": "5Server-VT-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kvm-tools-0:83-249.el5_8.5.x86_64 as a component of RHEL Virtualization (v. 5 server)", "product_id": "5Server-VT-5.8.Z:kvm-tools-0:83-249.el5_8.5.x86_64" }, "product_reference": "kvm-tools-0:83-249.el5_8.5.x86_64", "relates_to_product_reference": "5Server-VT-5.8.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Xen project" ] } ], "cve": "CVE-2012-3515", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2012-08-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "851252" } ], "notes": [ { "category": "description", "text": "Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a \"device model\u0027s address space.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: VT100 emulation vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did affect the versions of xen package as shipped with Red Hat\nEnterprise Linux 5.\n\nThis issue did affect the versions of kvm package as shipped with Red Hat\nEnterprise Linux 5.\n\nThis issue did affect the versions of qemu-kvm package as shipped with Red Hat\nEnterprise Linux 6.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-VT-5.8.Z:kmod-kvm-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kmod-kvm-debug-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kvm-0:83-249.el5_8.5.src", "5Client-VT-5.8.Z:kvm-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kvm-debuginfo-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kvm-qemu-img-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kvm-tools-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kmod-kvm-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kmod-kvm-debug-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kvm-0:83-249.el5_8.5.src", "5Server-VT-5.8.Z:kvm-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kvm-debuginfo-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kvm-qemu-img-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kvm-tools-0:83-249.el5_8.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3515" }, { "category": "external", "summary": "RHBZ#851252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851252" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3515", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3515" } ], "release_date": "2012-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-05T16:43:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nThe following procedure must be performed before this update will take\neffect:\n\n1) Stop all KVM guest virtual machines.\n\n2) Either reboot the hypervisor machine or, as the root user, remove (using\n\"modprobe -r [module]\") and reload (using \"modprobe [module]\") all of the\nfollowing modules which are currently running (determined using \"lsmod\"):\nkvm, ksm, kvm-intel or kvm-amd.\n\n3) Restart the KVM guest virtual machines.", "product_ids": [ "5Client-VT-5.8.Z:kmod-kvm-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kmod-kvm-debug-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kvm-0:83-249.el5_8.5.src", "5Client-VT-5.8.Z:kvm-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kvm-debuginfo-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kvm-qemu-img-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kvm-tools-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kmod-kvm-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kmod-kvm-debug-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kvm-0:83-249.el5_8.5.src", "5Server-VT-5.8.Z:kvm-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kvm-debuginfo-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kvm-qemu-img-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kvm-tools-0:83-249.el5_8.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1235" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 7.4, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Client-VT-5.8.Z:kmod-kvm-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kmod-kvm-debug-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kvm-0:83-249.el5_8.5.src", "5Client-VT-5.8.Z:kvm-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kvm-debuginfo-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kvm-qemu-img-0:83-249.el5_8.5.x86_64", "5Client-VT-5.8.Z:kvm-tools-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kmod-kvm-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kmod-kvm-debug-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kvm-0:83-249.el5_8.5.src", "5Server-VT-5.8.Z:kvm-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kvm-debuginfo-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kvm-qemu-img-0:83-249.el5_8.5.x86_64", "5Server-VT-5.8.Z:kvm-tools-0:83-249.el5_8.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: VT100 emulation vulnerability" } ] }
cve-2012-3515
Vulnerability from fkie_nvd
Published
2012-11-23 20:55
Modified
2024-11-21 01:41
Severity ?
Summary
Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*", "matchCriteriaId": "03FB8819-CA76-4C31-A901-6ACCB8325928", "versionEndExcluding": "1.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "550223A9-B9F1-440A-8C25-9F0F76AF7301", "vulnerable": true }, { "criteria": "cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "0D532B60-C8DD-4A2F-9D05-E574D23EB754", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "matchCriteriaId": "DE554781-1EB9-446E-911F-6C11970C47F4", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*", "matchCriteriaId": "EBB2C482-D2A4-48B3-ACE7-E1DFDCC409B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "matchCriteriaId": "D806A17E-B8F9-466D-807D-3F1E77603DC8", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*", "matchCriteriaId": "F0545634-EC4A-48E8-AB3D-49802FB11758", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*", "matchCriteriaId": "00720D8C-3FF3-4B1C-B74B-91F01A544399", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*", "matchCriteriaId": "22A79A35-05DB-4B9F-AD3E-EA6F933CF10C", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:ltss:*:*:*", "matchCriteriaId": "CED02712-1031-4206-AC4D-E68710F46EC9", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*", "matchCriteriaId": "A53FF936-C785-4CEF-BAD0-3C3EB90EE466", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*", "matchCriteriaId": "67960FB9-13D1-4DEE-8158-31BF31BCBE6F", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*", "matchCriteriaId": "88D6E858-FD8F-4C55-B7D5-CEEDA2BBA898", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*", "matchCriteriaId": "DB4D6749-81A1-41D7-BF4F-1C45A7F49A22", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*", "matchCriteriaId": "436EF2ED-FDBB-4B64-8EC4-33C3E4253F06", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*", "matchCriteriaId": "5AA37837-3083-4DC7-94F4-54FD5D7CB53C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "D86166F9-BBF0-4650-8CCD-0F9C97104D21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:virtualization:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "FCFEF451-4B77-4259-8000-B252E699A950", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:virtualization:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "37BA55FC-D350-4DEB-9802-40AF59C99E79", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "133AAFA7-AF42-4D7B-8822-AA2E85611BF5", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "8382A145-CDD9-437E-9DE7-A349956778B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "54D669D4-6D7E-449D-80C1-28FA44F06FFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "036E8A89-7A16-411F-9D31-676313BB7244", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "matchCriteriaId": "01EDA41C-6B2E-49AF-B503-EB3882265C11", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*", "matchCriteriaId": "EF49D26F-142E-468B-87C1-BABEA445255C", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "matchCriteriaId": "E4174F4F-149E-41A6-BBCC-D01114C05F38", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "matchCriteriaId": "8D305F7A-D159-4716-AB26-5E38BB5CD991", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a \"device model\u0027s address space.\"" }, { "lang": "es", "value": "Qemu, tal como se utiliza en Xen v4.0, v4.1 y posiblemente otros productos, al emular ciertos dispositivos con una consola virtual, permite a los usuarios locales del SO invitado obtener privilegios a trav\u00e9s de una secuencia VT100 de escape manipulada que desencadena la sobrescritura del espacio de direcciones de un \"device model\u0027s address space.\"" } ], "id": "CVE-2012-3515", "lastModified": "2024-11-21T01:41:02.263", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-11-23T20:55:03.523", "references": [ { "source": "secalert@redhat.com", "url": "http://git.qemu.org/?p=qemu-stable-0.15.git%3Ba=log" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00001.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00005.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00012.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00016.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00024.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00026.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00027.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00002.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2012-09/msg00051.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "http://lists.xen.org/archives/html/xen-announce/2012-09/msg00003.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1233.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1234.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1235.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1236.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1262.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1325.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/50472" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/50528" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/50530" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/50632" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/50689" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/50860" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/50913" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/51413" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/55082" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-201309-24.xml" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://support.citrix.com/article/CTX134708" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://wiki.xen.org/wiki/Security_Announcements#XSA-17_Qemu_VT100_emulation_vulnerability" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2012/dsa-2543" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2012/dsa-2545" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Mitigation", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2012/09/05/10" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/55413" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-1590-1" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201604-03" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://git.qemu.org/?p=qemu-stable-0.15.git%3Ba=log" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00012.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00016.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00024.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00026.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00027.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2012-09/msg00051.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "http://lists.xen.org/archives/html/xen-announce/2012-09/msg00003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1233.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1234.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1235.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1236.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1262.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1325.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/50472" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/50528" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/50530" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/50632" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/50689" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/50860" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/50913" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/51413" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/55082" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-201309-24.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://support.citrix.com/article/CTX134708" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://wiki.xen.org/wiki/Security_Announcements#XSA-17_Qemu_VT100_emulation_vulnerability" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2012/dsa-2543" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2012/dsa-2545" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Mitigation", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2012/09/05/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/55413" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-1590-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201604-03" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-rwhm-5hjg-54j9
Vulnerability from github
Published
2022-05-13 01:23
Modified
2022-05-13 01:23
Details
Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."
{ "affected": [], "aliases": [ "CVE-2012-3515" ], "database_specific": { "cwe_ids": [ "CWE-20" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2012-11-23T20:55:00Z", "severity": "HIGH" }, "details": "Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a \"device model\u0027s address space.\"", "id": "GHSA-rwhm-5hjg-54j9", "modified": "2022-05-13T01:23:55Z", "published": "2022-05-13T01:23:55Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3515" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2012:1233" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2012:1234" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2012:1235" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2012:1236" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2012:1262" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2012:1325" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2012-3515" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851252" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201604-03" }, { "type": "WEB", "url": "http://git.qemu.org/?p=qemu-stable-0.15.git%3Ba=log" }, { "type": "WEB", "url": "http://git.qemu.org/?p=qemu-stable-0.15.git;a=log" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00001.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00005.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00012.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00016.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00024.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00026.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00027.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00002.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2012-09/msg00051.html" }, { "type": "WEB", "url": "http://lists.xen.org/archives/html/xen-announce/2012-09/msg00003.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2012-1233.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2012-1234.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2012-1235.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2012-1236.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2012-1262.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2012-1325.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/50472" }, { "type": "WEB", "url": "http://secunia.com/advisories/50528" }, { "type": "WEB", "url": "http://secunia.com/advisories/50530" }, { "type": "WEB", "url": "http://secunia.com/advisories/50632" }, { "type": "WEB", "url": "http://secunia.com/advisories/50689" }, { "type": "WEB", "url": "http://secunia.com/advisories/50860" }, { "type": "WEB", "url": "http://secunia.com/advisories/50913" }, { "type": "WEB", "url": "http://secunia.com/advisories/51413" }, { "type": "WEB", "url": "http://secunia.com/advisories/55082" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-201309-24.xml" }, { "type": "WEB", "url": "http://support.citrix.com/article/CTX134708" }, { "type": "WEB", "url": "http://wiki.xen.org/wiki/Security_Announcements#XSA-17_Qemu_VT100_emulation_vulnerability" }, { "type": "WEB", "url": "http://www.debian.org/security/2012/dsa-2543" }, { "type": "WEB", "url": "http://www.debian.org/security/2012/dsa-2545" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2012/09/05/10" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/55413" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-1590-1" } ], "schema_version": "1.4.0", "severity": [] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.