Buffer overflow in the SCSI implementation in QEMU, as used in Xen, when a
SCSI controller has more than 256 attached devices, allows local users to
gain privileges via a small transfer buffer in a REPORT LUNS command.
qemu contains a possible buffer overflow ..............
Xen systems do not use the qemu SCSI code by default.
Only Xen systems whose administrators have deliberately configured HVM
guests to have emulated SCSI controllers, and where those guests are
provided with more than 256 devices, are vulnerable.
We are not aware of any such systems.
So what is it we have here? A white elephant or is it a red herring? To my understanding this reads as a qemu security issue. xen uses qemu which was qemu-kvm which is again qemu I think... and then it has the options qemu-xen vs. xemu-xen-traditional.
http://xenbits.xen.org/xsa/advisory-65.html lists NO PATCH.
Confirmed by Maintainer:
bug in qemu, NO patch for xen (no action for us)