QEMU is prone to a stack-based buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized memory buffer.
Attackers can exploit this issue to execute arbitrary code within the context of the Qemu process. Failed exploit attempts will likely cause denial-of-service conditions.
Information
Gentoo Linux
References: