Summary: | app-emultation/xen-tools-{4.2.5-r9,4.5.1-r2}: QEMU heap overflow flaw while processing certain ATAPI commands (XSA-138) (CVE-2015-5154) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Kristian Fiskerstrand (RETIRED) <k_f> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | ago, dlan, vapier |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | A2 [glsa cve] | ||
Package list: | Runtime testing required: | --- |
Description
Kristian Fiskerstrand (RETIRED)
![]() This is likely relevant for Qemu as well Issue is now public (In reply to Kristian Fiskerstrand from comment #1) > This is likely relevant for Qemu as well Its purely a qemu issue and not specific to Xen itself. *** Bug 556050 has been marked as a duplicate of this bug. *** addressed in qemu-2.3.0-r4 +*xen-tools-4.5.1-r2 (30 Jul 2015) +*xen-tools-4.2.5-r9 (30 Jul 2015) + + 30 Jul 2015; Yixun Lan <dlan@gentoo.org> +xen-tools-4.2.5-r9.ebuild, + +xen-tools-4.5.1-r2.ebuild: + security bump, bug 555532; bump ovmf to 2015/06/29, commit + cb9a7ebabcd6b8a49dc0854b2f9592d732b5afbd Arches, please test and mark stable: =app-emulation/xen-tools-4.2.5-r9 Target keywords Both : "amd64 x86" =app-emulation/xen-tools-4.5.1-r2 Target keywords Only: "amd64" amd64 stable x86 stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one. + 31 Jul 2015; Yixun Lan <dlan@gentoo.org> -xen-tools-4.2.5-r8.ebuild, + -xen-tools-4.5.1-r1.ebuild: + clean vulnerable ebuild due to security bug #555532 Arches and Maintainer(s), Thank you for your work. Added to an existing GLSA Request. This issue was resolved and addressed in GLSA 201604-03 at https://security.gentoo.org/glsa/201604-03 by GLSA coordinator Yury German (BlueKnight). |