From ${URL} : Qemu emulator built with the Human Monitor Interface(HMP) support is vulnerable to an OOB write issue. It occurs while processing 'sendkey' command in hmp_sendkey routine, if the command argument is longer than the 'keyname_buf' buffer size. A user/process could use this flaw to crash the Qemu process instance resulting in DoS. Upstream fix: ------------- -> https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02930.html Reference: ---------- -> http://www.openwall.com/lists/oss-security/2015/12/23/1 @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
fix landed upstream here: http://git.qemu.org/?p=qemu.git;a=commitdiff;h=64ffbe04eaafebf4045a3ace52a360c14959d196
this is in qemu-2.5.0-r2 and is fine for stable
Added to existing GLSA.
Clean as part of bug #567420
This issue was resolved and addressed in GLSA 201604-01 at https://security.gentoo.org/glsa/201604-01 by GLSA coordinator Yury German (BlueKnight).