** Description changed: - [Non-maskable interrupts triggerable by guests] + Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not + properly restrict access to PCI command registers, which might allow + local guest users to cause a denial of service (non-maskable interrupt + and host crash) by disabling the (1) memory or (2) I/O decoding for a + PCI Express device and then accessing the device, which triggers an + Unsupported Request (UR) response. Break-Fix: - -
-- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1430952 Title: CVE-2015-2150 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1430952/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
