It was discovered that QEMU incorrectly handled temporary files when
creating a snapshot. A local attacker could use this flaw to possibly
overwrite files with root privilege, or obtain sensitive information from
the guest.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 12.04 | noarch | qemu-kvm | < 1.0+noroms-0ubuntu14.1 | UNKNOWN |
Ubuntu | 12.04 | noarch | kvm | < 1:84+dfsg-0ubuntu16+1.0+noroms+0ubuntu14.1 | UNKNOWN |
Ubuntu | 12.04 | noarch | qemu | < 1.0+noroms-0ubuntu14.1 | UNKNOWN |
Ubuntu | 12.04 | noarch | qemu-utils | < 1.0+noroms-0ubuntu14.1 | UNKNOWN |
Ubuntu | 11.10 | noarch | qemu-kvm | < 0.14.1+noroms-0ubuntu6.4 | UNKNOWN |
Ubuntu | 11.10 | noarch | kvm | < 1:84+dfsg-0ubuntu16+0.14.1+noroms+0ubuntu6.4 | UNKNOWN |
Ubuntu | 11.10 | noarch | qemu | < 0.14.1+noroms-0ubuntu6.4 | UNKNOWN |
Ubuntu | 11.04 | noarch | qemu-kvm | < 0.14.0+noroms-0ubuntu4.6 | UNKNOWN |
Ubuntu | 11.04 | noarch | kvm | < 1:84+dfsg-0ubuntu16+0.14.0+noroms+0ubuntu4.6 | UNKNOWN |
Ubuntu | 11.04 | noarch | qemu | < 0.14.0+noroms-0ubuntu4.6 | UNKNOWN |