Summary: | <app-emulation/qemu-2.3.0-r4: i8254: out-of-bounds memory access in pit_ioport_read function (CVE-2015-3214) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | qemu+disabled |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=1229640 | ||
See Also: | https://bugzilla.redhat.com/show_bug.cgi?id=1229640 | ||
Whiteboard: | B2 [glsa cve] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | |||
Bug Blocks: | 555680, 556050 |
Description
Agostino Sarubbo
2015-07-27 15:09:21 UTC
addressed in qemu-2.3.0-r4. amd64 stable x86 stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one. Arches and Maintainer(s), Thank you for your work. Added to an existing GLSA Request. This issue was resolved and addressed in GLSA 201510-02 at https://security.gentoo.org/glsa/201510-02 by GLSA coordinator Kristian Fiskerstrand (K_F). |