From ${URL} : Qemu emulator built with the Task Priority Register(TPR) optimizations for 32-bit Windows guests, is vulnerable to a information leakage issue. It could occur while accessing Task Priority Register(TPR). A privileged user/process inside guest could use this issue to leak host memory bytes. Upstream patch: --------------- -> https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01118.html Reference: ---------- -> http://www.openwall.com/lists/oss-security/2016/04/14/3 @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
included fix in qemu-2.5.1. should be fine for stable.
@maintainer(s), please cleanup the vulnerable versions: app-emulation/qemu-2.5.0-{r2,r3}
commit 01e6cb9bcad3046a7223e31c4b533485d6ca0877 Author: Matthias Maier <tamiko@gentoo.org> Date: Sun Sep 4 22:58:05 2016 -0500 app-emulation/qemu: remove vulnerable 2.5.0 Package-Manager: portage-2.2.28
Added to an existing GLSA Request.
This issue was resolved and addressed in GLSA 201609-01 at https://security.gentoo.org/glsa/201609-01 by GLSA coordinator Yury German (BlueKnight).