SCIENTIFIC-LINUX-ERRATA Archives

March 2013

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Pat Riehecky <[log in to unmask]>
Reply To:
Pat Riehecky <[log in to unmask]>
Date:
Thu, 7 Mar 2013 10:59:51 -0600
Content-Type:
text/plain
Parts/Attachments:
text/plain (32 lines)
Synopsis:          Important: xen security update
Issue Date:        2013-03-06
CVE Numbers:       CVE-2012-6075
--

A flaw was found in the way QEMU emulated the e1000 network interface card
when the host was configured to accept jumbo network frames, and a fully-
virtualized guest using the e1000 emulated driver was not. A remote
attacker could use this flaw to crash the guest or, potentially, execute
arbitrary code with root privileges in the guest. (CVE-2012-6075)

After installing the updated packages, all running fully-virtualized
guests must be restarted for this update to take effect.
--

SL5
   x86_64
     xen-debuginfo-3.0.3-142.el5_9.2.i386.rpm
     xen-debuginfo-3.0.3-142.el5_9.2.x86_64.rpm
     xen-libs-3.0.3-142.el5_9.2.i386.rpm
     xen-libs-3.0.3-142.el5_9.2.x86_64.rpm
     xen-3.0.3-142.el5_9.2.x86_64.rpm
     xen-devel-3.0.3-142.el5_9.2.i386.rpm
     xen-devel-3.0.3-142.el5_9.2.x86_64.rpm
   i386
     xen-debuginfo-3.0.3-142.el5_9.2.i386.rpm
     xen-libs-3.0.3-142.el5_9.2.i386.rpm
     xen-3.0.3-142.el5_9.2.i386.rpm
     xen-devel-3.0.3-142.el5_9.2.i386.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2