From mboxrd@z Thu Jan 1 00:00:00 1970 From: Avi Kivity Subject: Re: KVM qemu-kvm "ext4_fill_flex_info()" Denial of Service Vulnerability Date: Wed, 11 Apr 2012 11:21:43 +0300 Message-ID: <4F853F17.3000404@redhat.com> References: <1408491.C5D10St5kt@devil> Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Cc: kvm@vger.kernel.org To: Agostino Sarubbo Return-path: Received: from mx1.redhat.com ([209.132.183.28]:9349 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754172Ab2DKIVv (ORCPT ); Wed, 11 Apr 2012 04:21:51 -0400 In-Reply-To: <1408491.C5D10St5kt@devil> Sender: kvm-owner@vger.kernel.org List-ID: On 04/10/2012 10:39 PM, Agostino Sarubbo wrote: > Hi all. > > Yesterday, secunia has released an advisory about qemu-kvm. > https://secunia.com/advisories/48645/ > > This seems to describe and 'old' kernel bug, but I don't know if there is a > 'link' between the ext4 issue and kvm. > > Can you explain a bit this issue? > Appears to be 100% unrelated to kvm. -- error compiling committee.c: too many arguments to function