CVE-2012-3515

NameCVE-2012-3515
DescriptionQemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-2542-1, DSA-2543-1, DSA-2545-1
Debian Bugs686764

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
qemu (PTS)bullseye1:5.2+dfsg-11+deb11u3fixed
bullseye (security)1:5.2+dfsg-11+deb11u2fixed
bookworm1:7.2+dfsg-7+deb12u7fixed
sid, trixie1:9.1.1+ds-5fixed
xen (PTS)bullseye4.14.6-1fixed
bullseye (security)4.14.5+94-ge49571868d-1fixed
bookworm4.17.3+10-g091466ba55-1~deb12u1fixed
sid, trixie4.17.3+36-g54dacb5c02-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
qemusourcesqueeze0.12.5+dfsg-3squeeze2DSA-2545-1
qemusource(unstable)1.1.2+dfsg-1
qemu-kvmsourcesqueeze0.12.5+dfsg-5+squeeze9DSA-2542-1
qemu-kvmsource(unstable)1.1.2+dfsg-1
xensourcesqueeze(not affected)
xensource(unstable)4.1.3-2686764
xen-qemu-dm-4.0sourcesqueeze4.0.1-2+squeeze2DSA-2543-1
xen-qemu-dm-4.0source(unstable)(unfixed)

Notes

[squeeze] - xen <not-affected> (Vulnerable code not present)

Search for package or bug name: Reporting problems