Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 10 Nov 2015 08:48:18 +0530 (IST)
From: P J P <ppandit@...hat.com>
To: oss security list <oss-security@...ts.openwall.com>
Subject: Re: CVE-2015-5307 kernel: kvm: guest to host DoS by triggering an
 infinite loop in microcode via #AC exception

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

+-- On Tue, 10 Nov 2015, P J P wrote --+
|   -> https://bugzilla.redhat.com/show_bug.cgi?id=1277557

Please see:
  -> https://bugzilla.redhat.com/show_bug.cgi?id=1277172

Thank you.
- --
Prasad J Pandit / Red Hat Product Security Team
47AF CE69 3A90 54AA 9045 1053 DD13 3D32 FE5B 041F

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=USYk
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.