From mboxrd@z Thu Jan 1 00:00:00 1970 From: Daniel Bareiro Subject: Doubt on KVM-88 vulnerabilities Date: Sun, 8 Nov 2009 15:42:40 -0300 Message-ID: <20091108184240.GA29279@defiant.freesoftware> Reply-To: dbareiro@gmx.net Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="Kj7319i9nmIyA2yE" To: KVM General Return-path: Received: from mail.gmx.net ([213.165.64.20]:46364 "HELO mail.gmx.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with SMTP id S1754807AbZKHSmn (ORCPT ); Sun, 8 Nov 2009 13:42:43 -0500 Received: from defiant (defiant.freesoftware [10.1.0.65]) by hermes.freesoftware (Postfix) with ESMTP id BE00E9C6 for ; Sun, 8 Nov 2009 15:41:52 -0300 (ART) Content-Disposition: inline Sender: kvm-owner@vger.kernel.org List-ID: --Kj7319i9nmIyA2yE Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hi all! I'm using KVM-88 compiled by myself from the source code provided by the official site of the project. Is this version of KVM vulnerable to the mentioned thing in the DSA-1907-1 [1]? In such case, there is some published patch that can be applied or some new version that solves this? Thanks in advance for your reply. Regards, Daniel [1] http://lists.debian.org/debian-security-announce/2009/msg00229.html --=20 Fingerprint: BFB3 08D6 B4D1 31B2 72B9 29CE 6696 BF1B 14E6 1D37 Powered by Debian GNU/Linux Squeeze - Linux user #188.598 --Kj7319i9nmIyA2yE Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iEYEARECAAYFAkr3ESAACgkQZpa/GxTmHTfEogCfXTtt/ZxTwhgwTIrme1/wzoAV 3bEAn3IR7VbEJl5LSq3h1c4+R1rr5/SV =0Bvs -----END PGP SIGNATURE----- --Kj7319i9nmIyA2yE--