Описание
ELSA-2012-0370: xen security and bug fix update (IMPORTANT)
[3.0.3-135.el5_8.2]
- Fix broken timestamp log (rhbz 797836)
[3.0.3-135.el5_8.1]
- qemu-dm/e1000: bounds packet size against buffer size (rhbz 786862)
- Use correct expansion in xen-network-common.sh (rhbz 797191)
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
xen
3.0.3-135.el5_8.2
xen-devel
3.0.3-135.el5_8.2
xen-libs
3.0.3-135.el5_8.2
Oracle Linux x86_64
xen
3.0.3-135.el5_8.2
xen-devel
3.0.3-135.el5_8.2
xen-libs
3.0.3-135.el5_8.2
Oracle Linux i386
xen
3.0.3-135.el5_8.2
xen-devel
3.0.3-135.el5_8.2
xen-libs
3.0.3-135.el5_8.2
Связанные CVE
Связанные уязвимости
Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.
Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.
Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.
Heap-based buffer overflow in the process_tx_desc function in the e100 ...
Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.