CVE-2012-6075

Priority
Description
Buffer overflow in the e1000_receive function in the e1000 device driver
(hw/e1000.c) in QEMU 1.3.0-rc2 and other versions, when the SBP and LPE
flags are disabled, allows remote attackers to cause a denial of service
(guest OS crash) and possibly execute arbitrary guest code via a large
packet.
Assigned-to
mdeslaur
Notes
mdeslaurhypervisor packages are in universe. For
issues in the hypervisor, add appropriate
tags to each section, ex:
Tags_xen: universe-binary
keesqemu and kvm are only included if the Xen issue is in full-virt mode.
sarnold"there will be no more qemu-kvm releases." -- Michael Tokarev
qemu patches should apply to xen's embedded copies
mdeslaurraring is replacing qemu-kvm with qemu (in progress)
Package
Source: kvm (LP Ubuntu Debian)
Upstream:needs-triage
Package
Source: qemu (LP Ubuntu Debian)
Upstream:needs-triage
Patches:
Vendor:http://www.debian.org/security/2013/dsa-2608
Package
Source: xen (LP Ubuntu Debian)
Upstream:needs-triage
Binaries built from this source package are in universe and so are supported by the community. For more details see https://wiki.ubuntu.com/SecurityTeam/FAQ#Official_Support
Package
Upstream:needs-triage
Binaries built from this source package are in universe and so are supported by the community. For more details see https://wiki.ubuntu.com/SecurityTeam/FAQ#Official_Support
Package
Upstream:needs-triage
Binaries built from this source package are in universe and so are supported by the community. For more details see https://wiki.ubuntu.com/SecurityTeam/FAQ#Official_Support
Package
Upstream:needs-triage
Binaries built from this source package are in universe and so are supported by the community. For more details see https://wiki.ubuntu.com/SecurityTeam/FAQ#Official_Support
More Information

Updated: 2020-07-28 19:48:26 UTC (commit d26b6ca9f5b3adb89bb036ce73ae7dab894935ec)