From ${URL} : Quick emulator(Qemu) built with the LSI SAS1068 Host Bus emulation support, is vulnerable to an invalid memory access issue. It could occur while processing scsi io requests in mptsas_process_scsi_io_request. A privileged user inside guest could use this flaw to crash the Qemu process instance on the host resulting in DoS. Upstream patch -------------- -> https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg03604.html Reference: ---------- -> http://www.openwall.com/lists/oss-security/2016/09/16/5 @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
http://git.qemu.org/?p=qemu.git;a=commit;h=670e56d3ed2918b3861d9216f2c0540d9e9ae0d5
Arches, please stabilize =app-emulation/qemu-2.7.0-r4 Target keywords: "amd64 x86" commit 153ded7835ad0fbd8ec8a7552f90c973d1c2dd28 Author: Matthias Maier <tamiko@gentoo.org> Date: Mon Sep 26 21:01:29 2016 -0500 app-emulation/qemu: security fixes, bug #594520, bug #594368 CVE-2016-7466.patch # bug 594520 CVE-2016-7423.patch # bug 594368 Package-Manager: portage-2.3.0
amd64 stable
x86 stable. Maintainer(s), please cleanup. Security, please vote.
commit 3418efea4dcee08436ad5cbf5b2081661c443c00 Author: Matthias Maier <tamiko@gentoo.org> Date: Sat Oct 1 20:52:01 2016 -0500 app-emulation/qemu: drop vulnerable, bug #594368 Package-Manager: portage-2.3.0
This issue was resolved and addressed in GLSA 201611-11 at https://security.gentoo.org/glsa/201611-11 by GLSA coordinator Aaron Bauman (b-man).