First published: Wed Jun 15 2011(Updated: )
Buffer overflow in the virtio subsystem in qemu-kvm 0.14.0 and earlier allows privileged guest users to cause a denial of service (guest crash) or gain privileges via a crafted indirect descriptor related to "virtqueue in and out requests."
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/kvm | ||
debian/qemu-kvm | ||
QEMU KVM | <=0.14.0 | |
QEMU KVM | =0.1.0 | |
QEMU KVM | =0.1.1 | |
QEMU KVM | =0.1.2 | |
QEMU KVM | =0.1.3 | |
QEMU KVM | =0.1.4 | |
QEMU KVM | =0.1.5 | |
QEMU KVM | =0.1.6 | |
QEMU KVM | =0.2.0 | |
QEMU KVM | =0.3.0 | |
QEMU KVM | =0.4.0 | |
QEMU KVM | =0.4.1 | |
QEMU KVM | =0.4.2 | |
QEMU KVM | =0.4.3 | |
QEMU KVM | =0.5.0 | |
QEMU KVM | =0.5.1 | |
QEMU KVM | =0.5.2 | |
QEMU KVM | =0.5.3 | |
QEMU KVM | =0.5.4 | |
QEMU KVM | =0.5.5 | |
QEMU KVM | =0.6.0 | |
QEMU KVM | =0.6.1 | |
QEMU KVM | =0.7.0 | |
QEMU KVM | =0.7.1 | |
QEMU KVM | =0.7.2 | |
QEMU KVM | =0.8.0 | |
QEMU KVM | =0.8.1 | |
QEMU KVM | =0.8.2 | |
QEMU KVM | =0.9.0 | |
QEMU KVM | =0.9.1 | |
QEMU KVM | =0.9.1-5 | |
QEMU KVM | =0.10.0 | |
QEMU KVM | =0.10.1 | |
QEMU KVM | =0.10.2 | |
QEMU KVM | =0.10.3 | |
QEMU KVM | =0.10.4 | |
QEMU KVM | =0.10.5 | |
QEMU KVM | =0.10.6 | |
QEMU KVM | =0.11.0 | |
QEMU KVM | =0.11.0-rc0 | |
QEMU KVM | =0.11.0-rc1 | |
QEMU KVM | =0.11.0-rc2 | |
QEMU KVM | =0.11.0-rc0 | |
QEMU KVM | =0.11.0-rc1 | |
QEMU KVM | =0.11.0-rc2 | |
QEMU KVM | =0.11.1 | |
QEMU KVM | =0.12.0 | |
QEMU KVM | =0.12.0-rc1 | |
QEMU KVM | =0.12.0-rc2 | |
QEMU KVM | =0.12.1 | |
QEMU KVM | =0.12.2 | |
QEMU KVM | =0.12.3 | |
QEMU KVM | =0.12.4 | |
QEMU KVM | =0.12.5 | |
QEMU KVM | =0.13.0 | |
QEMU KVM | =0.13.0-rc0 | |
QEMU KVM | =0.13.0-rc1 | |
QEMU KVM | =0.14.0-rc0 | |
QEMU KVM | =0.14.0-rc1 | |
QEMU KVM | =0.14.0-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2212 has a moderate severity level due to its potential for causing denial of service or privilege escalation.
To fix CVE-2011-2212, update your QEMU-KVM to version 0.14.1 or later which addresses the buffer overflow vulnerability.
CVE-2011-2212 affects privileged guest users in systems running QEMU-KVM versions 0.14.0 and earlier.
CVE-2011-2212 is classified as a buffer overflow vulnerability within the virtio subsystem of QEMU-KVM.
The potential consequences of CVE-2011-2212 include denial of service attacks resulting in guest crashes or unauthorized privilege escalation.