** Description changed:

- paravirtualized drivers incautious about shared memory contents
+ Xen, when used on a system providing PV backends, allows local guest OS
+ administrators to cause a denial of service (host OS crash) or gain
+ privileges by writing to memory shared between the frontend and backend,
+ aka a double fetch vulnerability.
  
  Break-Fix: - 454d5d882c7e412b840e3c99010fe81a9862f6fb
  Break-Fix: - 0f589967a73f1f30ab4ac4dd9ce0bb399b4d6357
  Break-Fix: - 68a33bfd8403e4e22847165d149823a2e0e67c9c
  Break-Fix: - 1f13d75ccb806260079e0679d55d9253e370ec8a
  Break-Fix: 402b27f9f2c22309d5bb285628765bc27b82fcf5 
18779149101c0dd43ded43669ae2a92d21b6f9cb
  Break-Fix: d9d660f6e562a47b4065eeb7e538910b0471b988 
be69746ec12f35b484707da505c6c76ff06f97dc
  Break-Fix: - 8135cf8b092723dbfcc611fe6fdcb3a36c9951c5

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1530403

Title:
  CVE-2015-8550

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1530403/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to