Michael Tokarev
2013-Jan-16 19:26 UTC
Re: [oss-security] Xen Security Advisory 41 (CVE-2012-6075) - qemu (e1000 device driver): Buffer overflow when processing large packets
16.01.2013 18:50, Xen.org security team пишет:> -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > Xen Security Advisory CVE-2012-6075 / XSA-41 > qemu (e1000 device driver): Buffer overflow when processing large packets > > SUMMARY AND SOURCES OF INFORMATION > =================================> > An issue in qemu has been disclosed which we believe affects some > users of Xen. > > The Qemu project has not itself issued an advisory. More information > may be available in the advisories published by the distros: > > https://bugzilla.redhat.com/show_bug.cgi?id=889301 > http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696051[]> RESOLUTION > =========> > The patch is this git commit: > http://git.qemu.org/?p=qemu.git;a=commitdiff;h=b0d9ffcd0251161c7c92f94804dcf599dfa3edebPlease note: there are TWO patches required in there. That's first, the second is http://git.qemu.org/?p=qemu.git;a=commitdiff;h=2c0331f4f7d241995452b99afaf0aab00493334a Thanks, /mjt _______________________________________________ Xen-users mailing list Xen-users@lists.xen.org http://lists.xen.org/xen-users
Reasonably Related Threads
- Xen Security Advisory 56 (CVE-2013-2072) - Buffer overflow in xencontrol Python bindings affecting xend
- VuXML entry for CVE-2007-1870: ClamAV CAB File Unstore Buffer Overflow
- FYI: CVE-2018-11806 Qemu: slirp: heap buffer overflow while reassembling fragmented datagrams
- Mitigation / disable FTS and pop3-uidl plugin was Re: CVE-2019-7524: Buffer overflow when reading extension header from dovecot index files
- Mitigation / disable FTS and pop3-uidl plugin was Re: CVE-2019-7524: Buffer overflow when reading extension header from dovecot index files