Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2013-0599

Опубликовано: 06 мар. 2013
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2013-0599: xen security update (IMPORTANT)

[3.0.3-142.el5_9.2]

  • e1000: discard packets that are too long if !SBP and !LPE (rhbz 910843)
  • e1000: discard oversized packets based on SBP|LPE (rhbz 910843)

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

xen

3.0.3-142.el5_9.2

xen-devel

3.0.3-142.el5_9.2

xen-libs

3.0.3-142.el5_9.2

Oracle Linux x86_64

xen

3.0.3-142.el5_9.2

xen-devel

3.0.3-142.el5_9.2

xen-libs

3.0.3-142.el5_9.2

Oracle Linux i386

xen

3.0.3-142.el5_9.2

xen-devel

3.0.3-142.el5_9.2

xen-libs

3.0.3-142.el5_9.2

Связанные CVE

Связанные уязвимости

ubuntu
больше 12 лет назад

Buffer overflow in the e1000_receive function in the e1000 device driver (hw/e1000.c) in QEMU 1.3.0-rc2 and other versions, when the SBP and LPE flags are disabled, allows remote attackers to cause a denial of service (guest OS crash) and possibly execute arbitrary guest code via a large packet.

redhat
больше 12 лет назад

Buffer overflow in the e1000_receive function in the e1000 device driver (hw/e1000.c) in QEMU 1.3.0-rc2 and other versions, when the SBP and LPE flags are disabled, allows remote attackers to cause a denial of service (guest OS crash) and possibly execute arbitrary guest code via a large packet.

nvd
больше 12 лет назад

Buffer overflow in the e1000_receive function in the e1000 device driver (hw/e1000.c) in QEMU 1.3.0-rc2 and other versions, when the SBP and LPE flags are disabled, allows remote attackers to cause a denial of service (guest OS crash) and possibly execute arbitrary guest code via a large packet.

debian
больше 12 лет назад

Buffer overflow in the e1000_receive function in the e1000 device driv ...

github
больше 3 лет назад

Buffer overflow in the e1000_receive function in the e1000 device driver (hw/e1000.c) in QEMU 1.3.0-rc2 and other versions, when the SBP and LPE flags are disabled, allows remote attackers to cause a denial of service (guest OS crash) and possibly execute arbitrary guest code via a large packet.