[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [oss-security] Xen Security Advisory 41 (CVE-2012-6075) - qemu (e1000 device driver): Buffer overflow when processing large packets



16.01.2013 18:50, Xen.org security team ÐÐÑÐÑ:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

             Xen Security Advisory CVE-2012-6075 / XSA-41
  qemu (e1000 device driver): Buffer overflow when processing large packets

SUMMARY AND SOURCES OF INFORMATION
==================================

An issue in qemu has been disclosed which we believe affects some
users of Xen.

The Qemu project has not itself issued an advisory. More information
may be available in the advisories published by the distros:

https://bugzilla.redhat.com/show_bug.cgi?id=889301
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696051
[]
RESOLUTION
==========

The patch is this git commit:
   
http://git.qemu.org/?p=qemu.git;a=commitdiff;h=b0d9ffcd0251161c7c92f94804dcf599dfa3edeb

Please note: there are TWO patches required in there.  That's
first, the second is

  
http://git.qemu.org/?p=qemu.git;a=commitdiff;h=2c0331f4f7d241995452b99afaf0aab00493334a

Thanks,

/mjt

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.