Debian Bug report logs -
#696051
potential guest-side buffer overflow caused by e1000 device emulation and large incoming packets - CVE-2012-6075
Package:
src:qemu;
Maintainer for src:qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>;
Reported by: Michael Tokarev <mjt@tlsmskru>
Date: Sun, 16 Dec 2012 ...
QEMU could be made to crash or run programs if it received specially
crafted network traffic ...
Synopsis
Important: qemu-kvm-rhev security update
Type/Severity
Security Advisory: Important
Topic
Updated qemu-kvm-rhev packages that fix one security issue are nowavailable for Red Hat Enterprise Linux 6The Red Hat Security Response Team has rated this update as havingimportant security impact A Common ...
Synopsis
Important: qemu-kvm-rhev security update
Type/Severity
Security Advisory: Important
Topic
Updated qemu-kvm-rhev packages that fix one security issue are nowavailable for Red Hat OpenStack FolsomThe Red Hat Security Response Team has rated this update as havingimportant security impact A Common Vu ...
Synopsis
Important: kvm security update
Type/Severity
Security Advisory: Important
Topic
Updated kvm packages that fix one security issue are now available for RedHat Enterprise Linux 5The Red Hat Security Response Team has rated this update as havingimportant security impact A Common Vulnerability Scorin ...
Synopsis
Important: qemu-kvm security update
Type/Severity
Security Advisory: Important
Topic
Updated qemu-kvm packages that fix one security issue are now available forRed Hat Enterprise Linux 6The Red Hat Security Response Team has rated this update as havingimportant security impact A Common Vulnerabil ...
Synopsis
Important: xen security update
Type/Severity
Security Advisory: Important
Topic
Updated xen packages that fix one security issue are now available forRed Hat Enterprise Linux 5The Red Hat Security Response Team has rated this update as havingimportant security impact A Common Vulnerability Scorin ...
Synopsis
Important: rhev-hypervisor6 security and bug fix update
Type/Severity
Security Advisory: Important
Topic
An updated rhev-hypervisor6 package that fixes several security issues andvarious bugs is now availableThe Red Hat Security Response Team has rated this update as havingimportant security impac ...
A buffer overflow was found in the e1000 emulation, which could be
triggered when processing jumbo frames
For the stable distribution (squeeze), this problem has been fixed in
version 401-2+squeeze3
For the unstable distribution (sid), this problem has been fixed in
version 413-8 of the xen source package
We recommend that you upgrade your x ...
It was discovered that the e1000 emulation code in QEMU does not
enforce frame size limits in the same way as the real hardware does
This could trigger buffer overflows in the guest operating system
driver for that network card, assuming that the host system does not
discard such frames (which it will by default)
For the stable distribution (sque ...
It was discovered that the e1000 emulation code in QEMU does not
enforce frame size limits in the same way as the real hardware does
This could trigger buffer overflows in the guest operating system
driver for that network card, assuming that the host system does not
discard such frames (which it will by default)
For the stable distribution (sque ...