CVE-2012-3515

NameCVE-2012-3515
DescriptionQemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more)
ReferencesDSA-2542-1, DSA-2543-1, DSA-2545-1
Debian Bugs686764

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
qemu (PTS)buster1:3.1+dfsg-8+deb10u8fixed
buster (security)1:3.1+dfsg-8+deb10u10fixed
bullseye (security), bullseye1:5.2+dfsg-11+deb11u2fixed
bookworm, sid1:7.2+dfsg-7fixed
xen (PTS)buster, buster (security)4.11.4+107-gef32c7afa2-1fixed
bullseye (security), bullseye4.14.5+94-ge49571868d-1fixed
bookworm, sid4.17.1+2-gb773c48e36-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
qemusourcesqueeze0.12.5+dfsg-3squeeze2DSA-2545-1
qemusource(unstable)1.1.2+dfsg-1
qemu-kvmsourcesqueeze0.12.5+dfsg-5+squeeze9DSA-2542-1
qemu-kvmsource(unstable)1.1.2+dfsg-1
xensourcesqueeze(not affected)
xensource(unstable)4.1.3-2686764
xen-qemu-dm-4.0sourcesqueeze4.0.1-2+squeeze2DSA-2543-1
xen-qemu-dm-4.0source(unstable)(unfixed)

Notes

[squeeze] - xen <not-affected> (Vulnerable code not present)

Search for package or bug name: Reporting problems