qemu-kvm-0.12.1.2-2.295.AXS4.2
エラータID: AXSA:2012-912:03
リリース日:
2012/09/19 Wednesday - 21:06
題名:
qemu-kvm-0.12.1.2-2.295.AXS4.2
影響のあるチャネル:
Asianux Server 4 for x86_64
Severity:
High
Description:
以下項目について対処しました。
[Security Fix]
CVE-2012-3515
No description available at the time of writing, please use the CVE link below.
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2012-3515
Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."
Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."
追加情報:
N/A
ダウンロード:
SRPMS
- qemu-kvm-0.12.1.2-2.295.AXS4.2.src.rpm
MD5: 2232c9a7d56beb36bc7dcd8bcd35727d
SHA-256: add6f5d88ece6cf09adfbba707f5932a1a2cf17c4055ab3594327f7c2f66b88a
Size: 7.90 MB
Asianux Server 4 for x86_64
- qemu-guest-agent-0.12.1.2-2.295.AXS4.2.x86_64.rpm
MD5: af06c60e5177ef833f6499639a74675b
SHA-256: 788258bcf1a566812483f120fb5f63e61d7fc241df479195bad811de918c9635
Size: 287.96 kB - qemu-img-0.12.1.2-2.295.AXS4.2.x86_64.rpm
MD5: 477ae657884602a0bd0aa5d1583ae67d
SHA-256: 869c3bf329c97ae6f9c7efe13979d70328c54e602fee0c3bbec3743cb9e95d43
Size: 414.45 kB - qemu-kvm-0.12.1.2-2.295.AXS4.2.x86_64.rpm
MD5: 741e1c8215c83b2371c2f6b6587b9b78
SHA-256: cb22cb47bb4c1ad8878d1a02ce9fa2de3d9371a43aa71dd45afc78cf42768c5b
Size: 1.25 MB - qemu-kvm-tools-0.12.1.2-2.295.AXS4.2.x86_64.rpm
MD5: dd0fa877123b1831c4e3c9af2249c05d
SHA-256: 5ed40c1b1a86f55332dc8ddb89d4ec46a8ea3199a2cf8cfebd51d62f103c9781
Size: 244.69 kB