First published: Fri Nov 04 2011(Updated: )
A flaw was found in the way QEMU handled VSC_ATR messages when CCID card passthru device was used. A malicious client could use this flaw to crash the QEMU process or, potentially, escalate his privileges.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux Server Supplementary | =6.1.z | |
QEMU qemu | <=0.15.1 | |
QEMU qemu | =0.15.0 | |
QEMU qemu | =0.15.0-rc1 | |
QEMU qemu | =0.15.0-rc2 | |
QEMU qemu | =1.0 | |
QEMU qemu | =1.0-rc1 | |
QEMU qemu | =1.0-rc2 | |
QEMU qemu | =1.0-rc3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.