Описание
ELSA-2013-0599: xen security update (IMPORTANT)
[3.0.3-142.el5_9.2]
- e1000: discard packets that are too long if !SBP and !LPE (rhbz 910843)
- e1000: discard oversized packets based on SBP|LPE (rhbz 910843)
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
xen
3.0.3-142.el5_9.2
xen-devel
3.0.3-142.el5_9.2
xen-libs
3.0.3-142.el5_9.2
Oracle Linux x86_64
xen
3.0.3-142.el5_9.2
xen-devel
3.0.3-142.el5_9.2
xen-libs
3.0.3-142.el5_9.2
Oracle Linux i386
xen
3.0.3-142.el5_9.2
xen-devel
3.0.3-142.el5_9.2
xen-libs
3.0.3-142.el5_9.2
Связанные CVE
Связанные уязвимости
Buffer overflow in the e1000_receive function in the e1000 device driver (hw/e1000.c) in QEMU 1.3.0-rc2 and other versions, when the SBP and LPE flags are disabled, allows remote attackers to cause a denial of service (guest OS crash) and possibly execute arbitrary guest code via a large packet.
Buffer overflow in the e1000_receive function in the e1000 device driver (hw/e1000.c) in QEMU 1.3.0-rc2 and other versions, when the SBP and LPE flags are disabled, allows remote attackers to cause a denial of service (guest OS crash) and possibly execute arbitrary guest code via a large packet.
Buffer overflow in the e1000_receive function in the e1000 device driver (hw/e1000.c) in QEMU 1.3.0-rc2 and other versions, when the SBP and LPE flags are disabled, allows remote attackers to cause a denial of service (guest OS crash) and possibly execute arbitrary guest code via a large packet.
Buffer overflow in the e1000_receive function in the e1000 device driv ...
Buffer overflow in the e1000_receive function in the e1000 device driver (hw/e1000.c) in QEMU 1.3.0-rc2 and other versions, when the SBP and LPE flags are disabled, allows remote attackers to cause a denial of service (guest OS crash) and possibly execute arbitrary guest code via a large packet.