public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
* KVM qemu-kvm "ext4_fill_flex_info()" Denial of Service Vulnerability
@ 2012-04-10 19:39 Agostino Sarubbo
  2012-04-11  8:21 ` Avi Kivity
  0 siblings, 1 reply; 2+ messages in thread
From: Agostino Sarubbo @ 2012-04-10 19:39 UTC (permalink / raw)
  To: kvm

[-- Attachment #1: Type: text/plain, Size: 372 bytes --]

Hi all.

Yesterday, secunia has released an advisory about qemu-kvm.
https://secunia.com/advisories/48645/

This seems to describe and 'old' kernel bug, but I don't know if there is a 
'link' between the ext4 issue and kvm.

Can you explain a bit this issue?

Thanks in advance.
-- 
Agostino Sarubbo		ago -at- gentoo.org
Gentoo/AMD64 Arch Security Liaison
GPG: 0x7CD2DC5D

[-- Attachment #2: This is a digitally signed message part. --]
[-- Type: application/pgp-signature, Size: 490 bytes --]

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2012-04-11  8:21 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2012-04-10 19:39 KVM qemu-kvm "ext4_fill_flex_info()" Denial of Service Vulnerability Agostino Sarubbo
2012-04-11  8:21 ` Avi Kivity

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox