From $URL: Hello, Quick Emulator(Qemu) built with the Network Block Device(NBD) Server support is vulnerable to a crash via SIGPIPE signal. It could occur if a client aborts connection due to any failure during negotiation. A remote user/process could use this flaw to crash the qemu-nbd server resulting in DoS. Upstream patch: --------------- -> https://lists.gnu.org/archive/html/qemu-devel/2017-06/msg02693.html Reference: ---------- -> https://bugzilla.redhat.com/show_bug.cgi?id=1466190
commit 606c4d5b81243fb243bd38a21326e60c3318138c (HEAD -> master, origin/master, origin/HEAD) Author: Matthias Maier <tamiko@gentoo.org> Date: Wed Jul 26 13:53:25 2017 -0500 app-emulation/qemu: security patches CVE-2017-7539, bug #625850 CVE-2017-10664, bug #623016 CVE-2017-10806, bug #624088 Package-Manager: Portage-2.3.6, Repoman-2.3.3