Name | CVE-2013-2231 |
Description | Unquoted Windows search path vulnerability in the QEMU Guest Agent service for Red Hat Enterprise Linux Desktop 6, HPC Node 6, Server 6, Workstation 6, Desktop Supplementary 6, Server Supplementary 6, Supplementary AUS 6.4, Supplementary EUS 6.4.z, and Workstation Supplementary 6, when installing on Windows, allows local users to gain privileges via a crafted program in an unspecified folder. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
qemu (PTS) | jessie, jessie (lts) | 1:2.1+dfsg-12+deb8u23 | fixed |
stretch (security) | 1:2.8+dfsg-6+deb9u17 | fixed | |
stretch (lts), stretch | 1:2.8+dfsg-6+deb9u19 | fixed | |
buster (security), buster, buster (lts) | 1:3.1+dfsg-8+deb10u12 | fixed | |
bullseye | 1:5.2+dfsg-11+deb11u3 | fixed | |
bullseye (security) | 1:5.2+dfsg-11+deb11u2 | fixed | |
bookworm | 1:7.2+dfsg-7+deb12u7 | fixed | |
sid, trixie | 1:9.2.0+ds-2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
qemu | source | (unstable) | (not affected) |
- qemu <not-affected> (Only affects win32 build)