From ${URL} : Qemu emulator built with the USB Net device emulation support is vulnerable to an integer overflow issue. It could occur while processing remote NDIS control message packets. As the incoming informationBufferOffset & Length combination could cross the integer range. A privileged user inside guest could use this flaw to leak host memory bytes to guest or crash the Qemu process instance resulting in DoS. Upstream patch: --------------- -> https://lists.gnu.org/archive/html/qemu-devel/2016-02/msg03658.html Reference: ---------- -> http://www.openwall.com/lists/oss-security/2016/02/22/3 @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
fix landed here: http://git.qemu.org/?p=qemu.git;a=commitdiff;h=fe3c546c5ff2a6210f9a4d8561cc64051ca8603e
this is in qemu-2.5.0-r2 and is fine for stable
Added to existing GLSA.
Clean as part of bug #567420
This issue was resolved and addressed in GLSA 201604-01 at https://security.gentoo.org/glsa/201604-01 by GLSA coordinator Yury German (BlueKnight).