Files
poky/meta
Daniel BORNAZ ee2b26fe75 qemu: security patch for CVE-2014-3471
Qemu PCIe bus support is vulnerable to a use-after-free flaw. It could
occur via guest, when it tries to hotplug/hotunplug devices on the
guest.

A user able to add & delete Virtio block devices on a guest could use
this flaw to crash the Qemu instance resulting in DoS.

Originated-by: Marcel Apfelbaum <address@hidden>

Updated the qemu recipe to include the security patch.

Upstream-Status: Submitted

(From OE-Core rev: a84e1749b489cee5ea219799c35e29b6edead30f)

Signed-off-by: Daniel BORNAZ <daniel.bornaz@enea.com>
Signed-off-by: Saul Wold <sgw@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2014-07-19 00:09:02 +01:00
..
2014-06-17 10:23:53 +01:00
2014-01-02 12:58:54 +00:00
2013-04-10 09:23:17 +01:00