| From: |
| Pat Riehecky <riehecky@fnal.gov> |
| To: |
| <SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV> |
| Subject: |
| Security ERRATA Important: xen on SL5.x i386/x86_64 |
| Date: |
| Thu, 7 Mar 2013 10:59:51 -0600 |
| Message-ID: |
| <5138C787.6080304@fnal.gov> |
| Archive-link: |
| Article, Thread
|
Synopsis: Important: xen security update
Issue Date: 2013-03-06
CVE Numbers: CVE-2012-6075
--
A flaw was found in the way QEMU emulated the e1000 network interface card
when the host was configured to accept jumbo network frames, and a fully-
virtualized guest using the e1000 emulated driver was not. A remote
attacker could use this flaw to crash the guest or, potentially, execute
arbitrary code with root privileges in the guest. (CVE-2012-6075)
After installing the updated packages, all running fully-virtualized
guests must be restarted for this update to take effect.
--
SL5
x86_64
xen-debuginfo-3.0.3-142.el5_9.2.i386.rpm
xen-debuginfo-3.0.3-142.el5_9.2.x86_64.rpm
xen-libs-3.0.3-142.el5_9.2.i386.rpm
xen-libs-3.0.3-142.el5_9.2.x86_64.rpm
xen-3.0.3-142.el5_9.2.x86_64.rpm
xen-devel-3.0.3-142.el5_9.2.i386.rpm
xen-devel-3.0.3-142.el5_9.2.x86_64.rpm
i386
xen-debuginfo-3.0.3-142.el5_9.2.i386.rpm
xen-libs-3.0.3-142.el5_9.2.i386.rpm
xen-3.0.3-142.el5_9.2.i386.rpm
xen-devel-3.0.3-142.el5_9.2.i386.rpm
- Scientific Linux Development Team
(
Log in to post comments)