Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2015-1087

Опубликовано: 10 июн. 2015
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2015-1087: qemu-kvm security update (IMPORTANT)

[0.12.1.2-2.448.el6_6.4]

  • kvm-pcnet-fix-Negative-array-index-read.patch [bz#1225886]
  • kvm-pcnet-force-the-buffer-access-to-be-in-bounds-during.patch [bz#1225886]
  • Resolves: bz#1225886 (EMBARGOED CVE-2015-3209 qemu-kvm: qemu: pcnet: multi-tmd buffer overflow in the tx path [rhel-6.6.z])

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

qemu-guest-agent

0.12.1.2-2.448.el6_6.4

qemu-img

0.12.1.2-2.448.el6_6.4

qemu-kvm

0.12.1.2-2.448.el6_6.4

qemu-kvm-tools

0.12.1.2-2.448.el6_6.4

Oracle Linux i686

qemu-guest-agent

0.12.1.2-2.448.el6_6.4

Связанные CVE

Связанные уязвимости

ubuntu
около 10 лет назад

Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.

redhat
около 10 лет назад

Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.

nvd
около 10 лет назад

Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.

debian
около 10 лет назад

Heap-based buffer overflow in the PCNET controller in QEMU allows remo ...

github
больше 3 лет назад

Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.