From ${URL} : A heap overflow flaw was found in the way QEMU's IDE subsystem handled I/O buffer access while processing certain ATAPI commands. A privileged guest user in a guest with CDROM drive enabled could potentially use this flaw to execute arbitrary code on the host with the privileges of the host's QEMU process corresponding to the guest. This issue was introduced via QEMU upstream commit http://git.qemu.org/?p=qemu.git;a=commit;h=ce560dcf . Upstream QEMU patch(es) submission: https://lists.gnu.org/archive/html/qemu-devel/2015-07/msg05162.html @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
This is actually #555532.
*** This bug has been marked as a duplicate of bug 555532 ***
addressed in qemu-2.3.0-r4
(In reply to Kristian Fiskerstrand from comment #2) > > *** This bug has been marked as a duplicate of bug 555532 *** I don't really understand why this is a duplicate. The bug is in the qemu code, which is present in both qemu and xen. Usually, in case like this we open more than one bug to better track each package separately.
This issue was resolved and addressed in GLSA 201510-02 at https://security.gentoo.org/glsa/201510-02 by GLSA coordinator Kristian Fiskerstrand (K_F).