From secunia security advisory at $URL: Description A vulnerability has been reported in KVM qemu-kvm, which can be exploited by malicious, local users in a guest virtual machine to cause a DoS (Denial of Service). The vulnerability is caused due to an error within the "ext4_fill_flex_info()" function in fs/ext4/super.c when mounting a file system and can be exploited to cause a division by zero. NOTE: This is caused due to an incomplete fix for vulnerability #2 in: https://secunia.com/advisories/37658/ Solution: Fixed in the GIT repository.http://git.kernel.org/?p=virt/kvm/kvm.git;a=commit;h=d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
This is a kernel bug in the ext4 filesystem kernel module. The patch you referenced is from the KVM repo that is branched off of Linus' tree.
(In reply to comment #1) > This is a kernel bug in the ext4 filesystem kernel module. The patch you > referenced is from the KVM repo that is branched off of Linus' tree. I just reported secunia advisory, let me investigate
(In reply to comment #1) > This is a kernel bug in the ext4 filesystem kernel module. The patch you > referenced is from the KVM repo that is branched off of Linus' tree. As you said this is completely invalid, I will poke secunia to know what's up. Apologize for the mailspam.