CVE-2012-3515
Publication date 6 September 2012
Last updated 24 July 2024
Ubuntu priority
Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."
Status
Package | Ubuntu Release | Status |
---|---|---|
qemu-kvm | ||
xen | ||
xen-3.1 | ||
xen-3.2 | ||
xen-3.3 | ||
xen-qemu-dm-4.0 | ||
Notes
Patch details
Package | Patch details |
---|---|
qemu-kvm | |
xen-qemu-dm-4.0 |
References
Related Ubuntu Security Notices (USN)
- USN-1590-1
- QEMU vulnerability
- 2 October 2012