summaryrefslogtreecommitdiffstats
path: root/meta/recipes-devtools/qemu/qemu/CVE-2016-4002.patch
diff options
context:
space:
mode:
authorAdrian Dudau <adrian.dudau@enea.com>2016-11-03 14:18:00 +0100
committerRichard Purdie <richard.purdie@linuxfoundation.org>2017-05-18 13:14:20 +0100
commit485e244db8cc7d2c421e60a1ad3a2415a30852ee (patch)
tree22dfc5fe92e8c92fc8e3272ee82ae80ae019d966 /meta/recipes-devtools/qemu/qemu/CVE-2016-4002.patch
parente8676b4f1a1ccb95597348b0fd42405dd679f02e (diff)
downloadpoky-485e244db8cc7d2c421e60a1ad3a2415a30852ee.tar.gz
qemu: Security fix CVE-2016-4439
affects qemu < 2.7.0 Quick Emulator(Qemu) built with the ESP/NCR53C9x controller emulation support is vulnerable to an OOB write access issue. The controller uses 16-byte FIFO buffer for command and data transfer. The OOB write occurs while writing to this command buffer in routine get_cmd(). A privileged user inside guest could use this flaw to crash the Qemu process resulting in DoS. References: ---------- http://www.openwall.com/lists/oss-security/2016/05/19/4 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-4441 (From OE-Core rev: 1bc071172236ea020cac9db96e33de81950a15ff) Signed-off-by: Adrian Dudau <adrian.dudau@enea.com> Signed-off-by: Armin Kuster <akuster808@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-devtools/qemu/qemu/CVE-2016-4002.patch')
0 files changed, 0 insertions, 0 deletions