** Changed in: linux-lts-quantal (Ubuntu Precise) Status: New => Invalid
** Changed in: linux (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux (Ubuntu Yakkety) Status: New => Invalid ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: Invalid => Fix Committed ** Changed in: linux-armadaxp (Ubuntu Precise) Status: New => Fix Released ** Changed in: linux-lts-xenial (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-lts-saucy (Ubuntu Precise) Status: New => Invalid ** Changed in: linux-raspi2 (Ubuntu Xenial) Status: New => Invalid ** Description changed: The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka "Linux pciback missing sanity checks." + + Break-Fix: - 56441f3c8e5bd45aab10dd9f8c505dd4bec03b0d + Break-Fix: - 5e0ce1455c09dd61d029b8ad45d82e1ac0b6c4c9 + Break-Fix: - a396f3a210c3a61e94d6b87ec05a75d0be2a60d0 + Break-Fix: - 7cfb905b9638982862f0331b36ccaaca5d383b49 + Break-Fix: - 408fb0e5aa7fda0059db282ff58c3b2a4278baa0 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1530406 Title: CVE-2015-8552 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1530406/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs