Summary: | <app-emulation/qemu-2.3.0-r6: buffer overflow in virtio-serial (CVE-2015-5745) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | qemu+disabled |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://lists.gnu.org/archive/html/qemu-devel/2015-07/msg05458.html | ||
See Also: | https://bugzilla.redhat.com/show_bug.cgi?id=1251157 | ||
Whiteboard: | B3 [glsa cve] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2015-08-10 10:28:27 UTC
(In reply to SpanKY from comment #1) > http://gitweb.gentoo.org/repo/gentoo.git/commit/ > ?id=03aa7f1902aba68926f08b4e85f95ee9f474910a Should we wait before go stable? Or can we stabilize that? stable is fine stabilized in another bug. cleanup done by vapier Arches and Maintainer(s), Thank you for your work. Added to an existing GLSA Request. This issue was resolved and addressed in GLSA 201602-01 at https://security.gentoo.org/glsa/201602-01 by GLSA coordinator Kristian Fiskerstrand (K_F). |