From http://www.openwall.com/lists/oss-security/2015/09/15/2: Qemu emulator built with the NE2000 NIC emulation support is vulnerable to an infinite loop issue. It could occur when receiving packets over the network. A privileged user inside guest could use this flaw to crash the Qemu instance resulting in DoS. Upstream fix: ------------- -> https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg03985.html From http://www.openwall.com/lists/oss-security/2015/09/15/3: Qemu emulator built with the NE2000 NIC emulation support is vulnerable to a heap buffer overflow issue. It could occur when receiving packets over the network. A privileged user inside guest could use this flaw to crash the Qemu instance or potentially execute arbitrary code on the host. Upstream fix: ------------- -> https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg03984.html @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
upstream commits: CVE-2015-5278: http://git.qemu.org/?p=qemu.git;a=commitdiff;h=737d2b3c41d59eb8f94ab7eb419b957938f24943 CVE-2015-5279: http://git.qemu.org/?p=qemu.git;a=commitdiff;h=9bbdbc66e5765068dce76e9269dce4547afd8ad4
qemu-2.4.0.1 in the tree should have the fixes for this and should be fine to mark stable http://gitweb.gentoo.org/repo/gentoo.git/commit/?id=4703b062bb7d0c6ebdf91827a3396435e6dea74a
stabilized in another bug. cleanup done by vapier
Arches and Maintainer(s), Thank you for your work. Added to an existing GLSA Request.
This issue was resolved and addressed in GLSA 201602-01 at https://security.gentoo.org/glsa/201602-01 by GLSA coordinator Kristian Fiskerstrand (K_F).