** Changed in: linux-lts-quantal (Ubuntu Precise)
       Status: New => Invalid

** Changed in: linux (Ubuntu Xenial)
       Status: New => Invalid

** Changed in: linux (Ubuntu Yakkety)
       Status: New => Invalid

** Changed in: linux-ti-omap4 (Ubuntu Precise)
       Status: Invalid => Fix Committed

** Changed in: linux-armadaxp (Ubuntu Precise)
       Status: New => Fix Released

** Changed in: linux-lts-xenial (Ubuntu Trusty)
       Status: New => Invalid

** Changed in: linux-lts-saucy (Ubuntu Precise)
       Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Xenial)
       Status: New => Invalid

** Description changed:

  The PCI backend driver in Xen, when running on an x86 system and using
  Linux 3.1.x through 4.3.x as the driver domain, allows local guest
  administrators to hit BUG conditions and cause a denial of service (NULL
  pointer dereference and host OS crash) by leveraging a system with
  access to a passed-through MSI or MSI-X capable physical PCI device and
  a crafted sequence of XEN_PCI_OP_* operations, aka "Linux pciback
  missing sanity checks."
+ 
+ Break-Fix: - 56441f3c8e5bd45aab10dd9f8c505dd4bec03b0d
+ Break-Fix: - 5e0ce1455c09dd61d029b8ad45d82e1ac0b6c4c9
+ Break-Fix: - a396f3a210c3a61e94d6b87ec05a75d0be2a60d0
+ Break-Fix: - 7cfb905b9638982862f0331b36ccaaca5d383b49
+ Break-Fix: - 408fb0e5aa7fda0059db282ff58c3b2a4278baa0

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1530404

Title:
  CVE-2015-8551

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1530404/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to