Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2012-0370

Опубликовано: 07 мар. 2012
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2012-0370: xen security and bug fix update (IMPORTANT)

[3.0.3-135.el5_8.2]

  • Fix broken timestamp log (rhbz 797836)

[3.0.3-135.el5_8.1]

  • qemu-dm/e1000: bounds packet size against buffer size (rhbz 786862)
  • Use correct expansion in xen-network-common.sh (rhbz 797191)

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

xen

3.0.3-135.el5_8.2

xen-devel

3.0.3-135.el5_8.2

xen-libs

3.0.3-135.el5_8.2

Oracle Linux x86_64

xen

3.0.3-135.el5_8.2

xen-devel

3.0.3-135.el5_8.2

xen-libs

3.0.3-135.el5_8.2

Oracle Linux i386

xen

3.0.3-135.el5_8.2

xen-devel

3.0.3-135.el5_8.2

xen-libs

3.0.3-135.el5_8.2

Связанные CVE

Связанные уязвимости

ubuntu
больше 13 лет назад

Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.

redhat
больше 13 лет назад

Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.

nvd
больше 13 лет назад

Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.

debian
больше 13 лет назад

Heap-based buffer overflow in the process_tx_desc function in the e100 ...

github
около 3 лет назад

Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.