Описание
ELSA-2015-2065: xen security update (IMPORTANT)
[3.0.3-147.el5]
- net: add checks to validate ring buffer pointers
- Resolves: bz#1263273 (xen: qemu: Heap overflow vulnerability in ne2000_receive() function)
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
xen
3.0.3-147.el5_11
xen-devel
3.0.3-147.el5_11
xen-libs
3.0.3-147.el5_11
Oracle Linux x86_64
xen
3.0.3-147.el5_11
xen-devel
3.0.3-147.el5_11
xen-libs
3.0.3-147.el5_11
Oracle Linux i386
xen
3.0.3-147.el5_11
xen-devel
3.0.3-147.el5_11
xen-libs
3.0.3-147.el5_11
Связанные CVE
Связанные уязвимости
Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets.
Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets.
Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets.
Heap-based buffer overflow in the ne2000_receive function in hw/net/ne ...
Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets.