LWN.net Logo

Scientific Linux alert SL-xen-20130307 (xen)

From:  Pat Riehecky <riehecky@fnal.gov>
To:  <SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV>
Subject:  Security ERRATA Important: xen on SL5.x i386/x86_64
Date:  Thu, 7 Mar 2013 10:59:51 -0600
Message-ID:  <5138C787.6080304@fnal.gov>
Archive-link:  Article, Thread

Synopsis: Important: xen security update Issue Date: 2013-03-06 CVE Numbers: CVE-2012-6075 -- A flaw was found in the way QEMU emulated the e1000 network interface card when the host was configured to accept jumbo network frames, and a fully- virtualized guest using the e1000 emulated driver was not. A remote attacker could use this flaw to crash the guest or, potentially, execute arbitrary code with root privileges in the guest. (CVE-2012-6075) After installing the updated packages, all running fully-virtualized guests must be restarted for this update to take effect. -- SL5 x86_64 xen-debuginfo-3.0.3-142.el5_9.2.i386.rpm xen-debuginfo-3.0.3-142.el5_9.2.x86_64.rpm xen-libs-3.0.3-142.el5_9.2.i386.rpm xen-libs-3.0.3-142.el5_9.2.x86_64.rpm xen-3.0.3-142.el5_9.2.x86_64.rpm xen-devel-3.0.3-142.el5_9.2.i386.rpm xen-devel-3.0.3-142.el5_9.2.x86_64.rpm i386 xen-debuginfo-3.0.3-142.el5_9.2.i386.rpm xen-libs-3.0.3-142.el5_9.2.i386.rpm xen-3.0.3-142.el5_9.2.i386.rpm xen-devel-3.0.3-142.el5_9.2.i386.rpm - Scientific Linux Development Team


(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds