On Tue, Jun 04, 2013 at 02:02:50PM -0700, Vinson Lee wrote:
> Hi,
> 
> This patch, which addresses CVE-2013-0231 and originally backported to
> 3.7.10, seems to have been missed for the 3.4 kernel. This patch is
> already in 3.7.5.z and 3.2.y.
> 
> commit 51ac8893a7a51b196501164e645583bf78138699
> Author: Jan Beulich <[email protected]>
> Date:   Wed Feb 6 10:30:38 2013 -0500
> 
>     xen-pciback: rate limit error messages from xen_pcibk_enable_msi{,x}()
> 
>     ... as being guest triggerable (e.g. by invoking
>     XEN_PCI_OP_enable_msi{,x} on a device not being MSI/MSI-X capable).
> 
>     This is CVE-2013-0231 / XSA-43.
> 
>     Also make the two messages uniform in both their wording and severity.
> 
>     Signed-off-by: Jan Beulich <[email protected]>
>     Acked-by: Ian Campbell <[email protected]>
>     Reviewed-by: Konrad Rzeszutek Wilk <[email protected]>

It breaks the build on 3.4, so I can't apply it.  Can someone please
backport it (and TEST IT) and send it so that I can apply it?

thanks,

greg k-h
--
To unsubscribe from this list: send the line "unsubscribe stable" in
the body of a message to [email protected]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to