Описание
ELSA-2015-1189: kvm security update (IMPORTANT)
[kvm-83-273.0.1.el5]
- Added kvm-add-oracle-workaround-for-libvirt-bug.patch
- Added kvm-Introduce-oel-machine-type.patch
[kvm-83.273.el5]
- kvm-pcnet-Properly-handle-TX-requests-during-Link-Fail.patch [bz#1225896]
- kvm-pcnet-fix-Negative-array-index-read.patch [bz#1225896]
- kvm-pcnet-force-the-buffer-access-to-be-in-bounds-during.patch [bz#1225896]
- Resolves: bz#1225896 (EMBARGOED CVE-2015-3209 kvm: qemu: pcnet: multi-tmd buffer overflow in the tx path [rhel-5.11.z)
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
kmod-kvm
83-273.0.1.el5_11
kmod-kvm-debug
83-273.0.1.el5_11
kvm
83-273.0.1.el5_11
kvm-qemu-img
83-273.0.1.el5_11
kvm-tools
83-273.0.1.el5_11
Связанные CVE
Связанные уязвимости
Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.
Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.
Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.
Heap-based buffer overflow in the PCNET controller in QEMU allows remo ...
Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.