** Description changed:

- [Non-maskable interrupts triggerable by guests]
+ Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not
+ properly restrict access to PCI command registers, which might allow
+ local guest users to cause a denial of service (non-maskable interrupt
+ and host crash) by disabling the (1) memory or (2) I/O decoding for a
+ PCI Express device and then accessing the device, which triggers an
+ Unsupported Request (UR) response.
  
  Break-Fix: - -

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1430952

Title:
  CVE-2015-2150

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1430952/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to