* jason:
> Could this be exploitable from within the guest vm? Eg could I execute
> commands on the hypervisor host as root by generating a malicious packet to
> attack the e1000 driver from within the guest?
Yes, but at this point, you could directly patch the guest memory, so
it's not a real a
Could this be exploitable from within the guest vm? Eg could I execute
commands on the hypervisor host as root by generating a malicious packet to
attack the e1000 driver from within the guest?
On Tue, Jan 15, 2013 at 3:26 PM, Florian Weimer wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2607-1 secur...@debian.org
http://www.debian.org/security/Florian Weimer
January 15, 2013