** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux (Ubuntu Xenial)
Status: New => Invalid
** Changed in: linux (Ubuntu Yakkety)
Status: New => Invalid
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: Invalid => Fix Committed
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Fix Released
** Changed in: linux-lts-xenial (Ubuntu Trusty)
Status: New => Invalid
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Xenial)
Status: New => Invalid
** Description changed:
The PCI backend driver in Xen, when running on an x86 system and using
Linux 3.1.x through 4.3.x as the driver domain, allows local guest
administrators to hit BUG conditions and cause a denial of service (NULL
pointer dereference and host OS crash) by leveraging a system with
access to a passed-through MSI or MSI-X capable physical PCI device and
a crafted sequence of XEN_PCI_OP_* operations, aka "Linux pciback
missing sanity checks."
+
+ Break-Fix: - 56441f3c8e5bd45aab10dd9f8c505dd4bec03b0d
+ Break-Fix: - 5e0ce1455c09dd61d029b8ad45d82e1ac0b6c4c9
+ Break-Fix: - a396f3a210c3a61e94d6b87ec05a75d0be2a60d0
+ Break-Fix: - 7cfb905b9638982862f0331b36ccaaca5d383b49
+ Break-Fix: - 408fb0e5aa7fda0059db282ff58c3b2a4278baa0
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1530404
Title:
CVE-2015-8551
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1530404/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs