From mboxrd@z Thu Jan 1 00:00:00 1970 From: Juan Quintela Subject: KVM call minutes for 2014-04-29 Date: Tue, 29 Apr 2014 17:20:37 +0200 Message-ID: <874n1ci2m2.fsf@elfo.mitica> Reply-To: quintela@redhat.com Mime-Version: 1.0 Content-Type: text/plain To: KVM devel mailing list , qemu list Return-path: Received: from mx1.redhat.com ([209.132.183.28]:39823 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755931AbaD2PUk (ORCPT ); Tue, 29 Apr 2014 11:20:40 -0400 Sender: kvm-owner@vger.kernel.org List-ID: 2014-04-29 ---------- - security (CVE) New group to handle that issues responsible. Mail is still not encrypted, wolud be. mst writing a wiki page about it what is the criteria to request (not) for a CVE number Look at http://wiki.qemu.org/SecurityProcess - hot [un]plug for passthrough devices for platform devices Lots of discussions about how to do it internally/externally from qemu, both with its [dis]advantages. Basically how to do things there. Later, Juan.