From ${URL} : Qemu emulator built with the SCSI MegaRAID SAS HBA emulation support is vulnerable to a stack buffer overflow issue. It occurs while processing the SCSI controller's CTRL_GET_INFO command. A privileged guest user could use this flaw to crash the Qemu process instance resulting in DoS. Upstream patch: --------------- -> https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg03737.html Reference: ---------- -> http://www.openwall.com/lists/oss-security/2015/12/22/1 @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
This is fixed upstream: http://git.qemu.org/?p=qemu.git;a=commitdiff;h=36fef36b91f7ec0435215860f1458b5342ce2811
this is in qemu-2.5.0-r2 and is fine for stable
GLSA request opened.
Clean as part of bug #567420
This issue was resolved and addressed in GLSA 201604-01 at https://security.gentoo.org/glsa/201604-01 by GLSA coordinator Yury German (BlueKnight).