Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2015-2065

Опубликовано: 16 нояб. 2015
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2015-2065: xen security update (IMPORTANT)

[3.0.3-147.el5]

  • net: add checks to validate ring buffer pointers
  • Resolves: bz#1263273 (xen: qemu: Heap overflow vulnerability in ne2000_receive() function)

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

xen

3.0.3-147.el5_11

xen-devel

3.0.3-147.el5_11

xen-libs

3.0.3-147.el5_11

Oracle Linux x86_64

xen

3.0.3-147.el5_11

xen-devel

3.0.3-147.el5_11

xen-libs

3.0.3-147.el5_11

Oracle Linux i386

xen

3.0.3-147.el5_11

xen-devel

3.0.3-147.el5_11

xen-libs

3.0.3-147.el5_11

Связанные CVE

Связанные уязвимости

ubuntu
почти 10 лет назад

Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets.

redhat
почти 10 лет назад

Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets.

nvd
почти 10 лет назад

Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets.

debian
почти 10 лет назад

Heap-based buffer overflow in the ne2000_receive function in hw/net/ne ...

github
больше 3 лет назад

Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets.