Source: qemu Version: 1:2.1+dfsg-1 Severity: normal Tags: security upstream patch fixed-upstream
Hi, the following vulnerability was published for qemu. Filling it as severity normal only, since AFAICT, by default QEMU/KVM guests use in-kernel (KVM) PIT emulation and thus not vulnerable. CVE-2015-3214[0]: i8254: out-of-bounds memory access in pit_ioport_read function If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2015-3214 [1] https://bugzilla.redhat.com/show_bug.cgi?id=1229640 Regards, Salvatore _______________________________________________ Secure-testing-team mailing list [email protected] http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-team

