From secunia security advisory at $URL: Description: The weakness is caused due to libvirt incorrectly inserting certain firewall rules, which can lead to unintended access to ports 53 and 67. Successful exploitation requires that a libvirt network with "bridge" forward mode is defined and started and that libvirtd is restarted. The weakness is reported in version 0.9.4 through 0.9.8. Solution: Update to version 0.9.9.
@Maintainer: this vulnerability seems happen with a not default configuration, if yes, please tell me and I'll provide to change severity level. TIA
Yes, if USE=virt-network is setup and libvirt is configured to generate your bridge, which isn't the method that Gentoo uses or recommends by default, then you are vulnerable.
@cardoe, virtualization: I see =app-emulation/libvirt-0.9.10-r2 in the tree. Can we go for stabilization?
Arches: please stabilize 0.9.10-r4 target keywords: amd64 x86
x86 stable
amd64 stable