In the news: http://www.zdnet.com/article/venom-security-flaw-millions-of-virtual-machines-datacenters/ http://venom.crowdstrike.com/ I'm wondering how SELinux/SVirt can protect against this? https://libvirt.org/drvqemu.html#securitysvirt My guess is that if an attacker subverts a qemu-kvm guest, they cannot use that to access other VMs. But can they still crash the other guests or the host itself? Thanks. -- selinux mailing list selinux@xxxxxxxxxxxxxxxxxxxxxxx https://admin.fedoraproject.org/mailman/listinfo/selinux