Summary: | <app-emulation/qemu-2.3.0-r2: pcnet: multi-tmd buffer overflow in the tx path (CVE-2015-3209) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | cardoe, qemu+disabled |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=1225882 | ||
See Also: | https://bugzilla.redhat.com/show_bug.cgi?id=1225882 | ||
Whiteboard: | B2 [glsa cve] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2015-06-11 10:10:38 UTC
Commit message: Add fix from upstream for CVE-2015-3209 http://sources.gentoo.org/app-emulation/qemu/files/qemu-2.3.0-CVE-2015-3209.patch?rev=1.1 http://sources.gentoo.org/app-emulation/qemu/qemu-2.3.0-r2.ebuild?rev=1.1 CVE-2015-3209 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3209): Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set. fine stabilize the new version amd64 stable x86 stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one. Arches, Thank you for your work. New GLSA Request filed. Maintainer(s), please drop the vulnerable version(s). Vulnerable versions have been removed. This issue was resolved and addressed in GLSA 201510-02 at https://security.gentoo.org/glsa/201510-02 by GLSA coordinator Kristian Fiskerstrand (K_F). |