Summary: | QEMU-KVM Guest to Host Kernel Escape Vulnerability: vhost/vhost_net kernel buffer overflow | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Kernel | Assignee: | Gentoo Kernel Security <security-kernel> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | qemu+disabled |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://www.openwall.com/lists/oss-security/2019/09/17/1 | ||
Whiteboard: | |||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2019-09-17 08:44:34 UTC
Fix is present in
>=sys-kernel/gentoo-sources-4.19.73
>=sys-kernel/gentoo-sources-4.14.144
>=sys-kernel/gentoo-sources-4.9.193
>=sys-kernel/gentoo-sources-4.4.193
@security: *ping* ~ $ fix_in_what_release 060423bfdee3f8bc6e2c1bac97de24d5415e2bc4 4.4.193 4.9.193 4.14.144 4.19.73 5.2.15 So, long been fixed in tree. |