From ${URL} : It was reported that Qemu emulator built with the virtio-serial vmchannel support is vulnerable to a buffer overflow issue. It could occur while exchanging virtio control messages between guest & the host. A malicious guest could use this flaw to corrupt few bytes of Qemu memory area, potentially crashing the Qemu process. Upstream fix: https://lists.gnu.org/archive/html/qemu-devel/2015-07/msg05458.html @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
http://gitweb.gentoo.org/repo/gentoo.git/commit/?id=03aa7f1902aba68926f08b4e85f95ee9f474910a
(In reply to SpanKY from comment #1) > http://gitweb.gentoo.org/repo/gentoo.git/commit/ > ?id=03aa7f1902aba68926f08b4e85f95ee9f474910a Should we wait before go stable? Or can we stabilize that?
stable is fine
stabilized in another bug. cleanup done by vapier
Arches and Maintainer(s), Thank you for your work. Added to an existing GLSA Request.
This issue was resolved and addressed in GLSA 201602-01 at https://security.gentoo.org/glsa/201602-01 by GLSA coordinator Kristian Fiskerstrand (K_F).