[stable request 3.4] xen-pciback: rate limit error messages from xen_pcibk_enable_msi{,x}()

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi,

This patch, which addresses CVE-2013-0231 and originally backported to
3.7.10, seems to have been missed for the 3.4 kernel. This patch is
already in 3.7.5.z and 3.2.y.

commit 51ac8893a7a51b196501164e645583bf78138699
Author: Jan Beulich <jbeulich@xxxxxxxx>
Date:   Wed Feb 6 10:30:38 2013 -0500

    xen-pciback: rate limit error messages from xen_pcibk_enable_msi{,x}()

    ... as being guest triggerable (e.g. by invoking
    XEN_PCI_OP_enable_msi{,x} on a device not being MSI/MSI-X capable).

    This is CVE-2013-0231 / XSA-43.

    Also make the two messages uniform in both their wording and severity.

    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Reviewed-by: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>

Cheers,
Vinson
--
To unsubscribe from this list: send the line "unsubscribe stable" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [Linux Kernel]     [Kernel Development Newbies]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite Hiking]     [Linux Kernel]     [Linux SCSI]