Summary: | app-emulation/xen, app-emulation/xen-tools: I/O port access privilege escalation in x86-64 Linux (XSA-171) (CVE-2016-3157) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Yury German <blueknight> |
Component: | Vulnerabilities | Assignee: | Gentoo Kernel Security <security-kernel> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | hydrapolic, idella4, kernel |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | B1 [stable blocked cve] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 522930 | ||
Bug Blocks: |
Description
Yury German
2016-04-05 05:50:09 UTC
This patch is not for app-emulation/xen. The patch is a kernel patch As per Ian, this is a kernel bug. Redirecting to Kernel maintainers. All upstream LTS kernels are including the patch; All sys-kernel/gentoo-sources ebuilds excluding sys-kernel/gentoo-sources-3.4.x have stable ebuilds containing the fix. =sys-kernel/gentoo-sources-3.4.113 will be stabilized in bug 522930. Security, can you please close this obsolete one? Thanks |