Summary: | <app-emulation/qemu-2.0.0-r1: usb: fix up post load checks (CVE-2014-3461) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | cardoe, qemu+disabled |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://git.qemu.org/?p=qemu.git;a=commitdiff;h=719ffe1f5f72b1c7ace4afe9ba2815bcb53a829e | ||
See Also: | https://bugzilla.redhat.com/show_bug.cgi?id=1096821 | ||
Whiteboard: | B2 [glsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | |||
Bug Blocks: | 510234 |
Description
Agostino Sarubbo
![]() upstream has merged the fix now qemu-2.0.0-r1 has the fixes (In reply to SpanKY from comment #2) > qemu-2.0.0-r1 has the fixes Are we ready for stabilization? Arches, please test and mark stable: =app-emulation/qemu-2.0.0-r1 Target keywords : "amd64 x86" I suppose we also should do the deps!? Are there any opinions about other versions than the following? =sys-cluster/glusterfs-3.5.1 =sys-infiniband/librdmacm-1.0.18 =sys-infiniband/libibverbs-1.1.7 =net-fs/libnfs-1.9.5 (In reply to Andreas Schürch from comment #5) > I suppose we also should do the deps!? > Are there any opinions about other versions than the following? > =sys-cluster/glusterfs-3.5.1 > =sys-infiniband/librdmacm-1.0.18 > =sys-infiniband/libibverbs-1.1.7 > =net-fs/libnfs-1.9.5 I guess we could stable-mask the infiniband IUSE. amd64 stable x86 stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one. Arches, Thank you for your work Maintainer(s), please drop the vulnerable version(s). Added to existing GLSA Request cleanup done This issue was resolved and addressed in GLSA 201408-17 at http://security.gentoo.org/glsa/glsa-201408-17.xml by GLSA coordinator Kristian Fiskerstrand (K_F). CVE-2014-3461 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3461): hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks." |