Summary: | app-emulation/qemu-*: buffer overflow (CVE-2010-0297) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Stefan Behte (RETIRED) <craig> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | lu_zero, qemu+disabled |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=557025 | ||
Whiteboard: | ~2 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Stefan Behte (RETIRED)
![]() ![]() app-emulation/qemu-kvm-0.12.3 already has this fix. CVE-2010-0297 http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=babd03fde68093482528010a5435c14ce9128e3f Well qemu-kvm just takes qemu releases and patches their KVM support. So if the issue was present before 0.11.1, then qemu-kvm versions 0.11.0 and kvm-88 and older would be affected. qemu and qemu-kvm got the patches. app-emulation/qemu-softmmu still has the vulnerable version of usb-linux.c. Could we bump to a newer version? |