Summary: | <app-emulation/virtualbox{,-bin}-4.3.28: Privilege escalation via emulated floppy disk drive (CVE-2015-3456) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Sam James <sam> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | patrick, polynomial-c |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.oracle.com/technetwork/topics/security/alert-cve-2015-3456-2542656.html | ||
Whiteboard: | A2 [glsa cve] | ||
Package list: | Runtime testing required: | --- |
Description
Sam James
![]() ![]() ![]() ![]() @Maintainers: Is 4.3.28 ready for stabilization? CVE-2015-3456 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3456): The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM. This is now fixed. Current stable version in repository is =app-emulation/virtualbox{,-bin}-4.3.38 which is >4.3.28. No vulnerable version left in tree. So nothing left to do for us. Added to existing GLSA. Added CVE status based on comment #2. This issue was resolved and addressed in GLSA 201612-27 at https://security.gentoo.org/glsa/201612-27 by GLSA coordinator Kristian Fiskerstrand (K_F). |