Hi,

Last month I've gone through most of the CVEs affecting qemu in the
past years and investigated whether they were likely to affect the
wheezy version of Xen. For that I have considered that any
vulnerability affecting the embedded version of Qemu was also
affecting Xen, which is, according to Moritz, not true.

Thus, I'd like to go through the CVEs I marked as affecting Xen in
wheezy and test whether they are really affecting Xen. However, I do
not know Xen very well and I will surely not be very efficient.

Moreover, I fear that this is not a very good way of spending my
assigned time.

So here is my question: How should we handle this mass of potential
vulnerabilities in Xen ? Should we take time to test these (mostly
minor) potential issues ?

Guido: As far as I remember, you wanted to speak about it with
Creadiv. Did you do it ? Any reply or advice from them ?

If needed, I can also take time to work on it outside of my assigned
time. In this case however, I'm not sure I'll be able to do it in a
timely manner.

Cheers,
 Hugo

-- 
             Hugo Lefeuvre (hle)    |    www.owl.eu.com
4096/ ACB7 B67F 197F 9B32 1533 431C AC90 AC3E C524 065E

Attachment: signature.asc
Description: PGP signature

Reply via email to