Heap-based buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU allows guest OS administrators to cause a denial of service (instance crash) or possibly execute arbitrary code via a series of packets in loopback mode.
https://security.gentoo.org/glsa/201604-03
https://security.gentoo.org/glsa/201602-01
https://lists.gnu.org/archive/html/qemu-devel/2015-11/msg06342.html
http://xenbits.xen.org/xsa/advisory-162.html
http://www.securitytracker.com/id/1034268
http://www.securityfocus.com/bid/78227
http://www.openwall.com/lists/oss-security/2015/11/30/2
http://www.debian.org/security/2016/dsa-3471
http://www.debian.org/security/2016/dsa-3470
http://www.debian.org/security/2016/dsa-3469
http://rhn.redhat.com/errata/RHSA-2015-2696.html