** Changed in: linux-lts-quantal (Ubuntu Precise)
       Status: New => Invalid

** Changed in: linux (Ubuntu Xenial)
       Status: New => Invalid

** Changed in: linux (Ubuntu Yakkety)
       Status: New => Invalid

** Changed in: linux-ti-omap4 (Ubuntu Precise)
       Status: Invalid => Fix Committed

** Changed in: linux-armadaxp (Ubuntu Precise)
       Status: New => Fix Released

** Changed in: linux-lts-xenial (Ubuntu Trusty)
       Status: New => Invalid

** Changed in: linux-lts-saucy (Ubuntu Precise)
       Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Xenial)
       Status: New => Invalid

** Description changed:

  The PCI backend driver in Xen, when running on an x86 system and using
  Linux 3.1.x through 4.3.x as the driver domain, allows local guest
  administrators to generate a continuous stream of WARN messages and
  cause a denial of service (disk consumption) by leveraging a system with
  access to a passed-through MSI or MSI-X capable physical PCI device and
  XEN_PCI_OP_enable_msi operations, aka "Linux pciback missing sanity
  checks."
+ 
+ Break-Fix: - 56441f3c8e5bd45aab10dd9f8c505dd4bec03b0d
+ Break-Fix: - 5e0ce1455c09dd61d029b8ad45d82e1ac0b6c4c9
+ Break-Fix: - a396f3a210c3a61e94d6b87ec05a75d0be2a60d0
+ Break-Fix: - 7cfb905b9638982862f0331b36ccaaca5d383b49
+ Break-Fix: - 408fb0e5aa7fda0059db282ff58c3b2a4278baa0

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1530406

Title:
  CVE-2015-8552

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1530406/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to