** Description changed: - paravirtualized drivers incautious about shared memory contents + Xen, when used on a system providing PV backends, allows local guest OS + administrators to cause a denial of service (host OS crash) or gain + privileges by writing to memory shared between the frontend and backend, + aka a double fetch vulnerability. Break-Fix: - 454d5d882c7e412b840e3c99010fe81a9862f6fb Break-Fix: - 0f589967a73f1f30ab4ac4dd9ce0bb399b4d6357 Break-Fix: - 68a33bfd8403e4e22847165d149823a2e0e67c9c Break-Fix: - 1f13d75ccb806260079e0679d55d9253e370ec8a Break-Fix: 402b27f9f2c22309d5bb285628765bc27b82fcf5 18779149101c0dd43ded43669ae2a92d21b6f9cb Break-Fix: d9d660f6e562a47b4065eeb7e538910b0471b988 be69746ec12f35b484707da505c6c76ff06f97dc Break-Fix: - 8135cf8b092723dbfcc611fe6fdcb3a36c9951c5
-- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1530403 Title: CVE-2015-8550 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1530403/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
