Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 16 Jan 2013 23:26:09 +0400
From: Michael Tokarev <mjt@....msk.ru>
To: oss-security@...ts.openwall.com
CC: "Xen.org security team" <security@....org>, 
 xen-announce@...ts.xen.org, xen-devel@...ts.xen.org, 
 xen-users@...ts.xen.org
Subject: Re: Xen Security Advisory 41 (CVE-2012-6075) - qemu
 (e1000 device driver): Buffer overflow when processing large packets

16.01.2013 18:50, Xen.org security team пишет:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> 	     Xen Security Advisory CVE-2012-6075 / XSA-41
>   qemu (e1000 device driver): Buffer overflow when processing large packets
>
> SUMMARY AND SOURCES OF INFORMATION
> ==================================
>
> An issue in qemu has been disclosed which we believe affects some
> users of Xen.
>
> The Qemu project has not itself issued an advisory. More information
> may be available in the advisories published by the distros:
>
> https://bugzilla.redhat.com/show_bug.cgi?id=889301
> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696051
[]
> RESOLUTION
> ==========
>
> The patch is this git commit:
>    http://git.qemu.org/?p=qemu.git;a=commitdiff;h=b0d9ffcd0251161c7c92f94804dcf599dfa3edeb

Please note: there are TWO patches required in there.  That's
first, the second is

   http://git.qemu.org/?p=qemu.git;a=commitdiff;h=2c0331f4f7d241995452b99afaf0aab00493334a

Thanks,

/mjt

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.