Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2015-1189

Опубликовано: 25 июн. 2015
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2015-1189: kvm security update (IMPORTANT)

[kvm-83-273.0.1.el5]

  • Added kvm-add-oracle-workaround-for-libvirt-bug.patch
  • Added kvm-Introduce-oel-machine-type.patch

[kvm-83.273.el5]

  • kvm-pcnet-Properly-handle-TX-requests-during-Link-Fail.patch [bz#1225896]
  • kvm-pcnet-fix-Negative-array-index-read.patch [bz#1225896]
  • kvm-pcnet-force-the-buffer-access-to-be-in-bounds-during.patch [bz#1225896]
  • Resolves: bz#1225896 (EMBARGOED CVE-2015-3209 kvm: qemu: pcnet: multi-tmd buffer overflow in the tx path [rhel-5.11.z)

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

kmod-kvm

83-273.0.1.el5_11

kmod-kvm-debug

83-273.0.1.el5_11

kvm

83-273.0.1.el5_11

kvm-qemu-img

83-273.0.1.el5_11

kvm-tools

83-273.0.1.el5_11

Связанные CVE

Связанные уязвимости

ubuntu
около 10 лет назад

Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.

redhat
около 10 лет назад

Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.

nvd
около 10 лет назад

Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.

debian
около 10 лет назад

Heap-based buffer overflow in the PCNET controller in QEMU allows remo ...

github
больше 3 лет назад

Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.