Hi, This patch, which addresses CVE-2013-0231 and originally backported to 3.7.10, seems to have been missed for the 3.4 kernel. This patch is already in 3.7.5.z and 3.2.y. commit 51ac8893a7a51b196501164e645583bf78138699 Author: Jan Beulich <jbeulich@xxxxxxxx> Date: Wed Feb 6 10:30:38 2013 -0500 xen-pciback: rate limit error messages from xen_pcibk_enable_msi{,x}() ... as being guest triggerable (e.g. by invoking XEN_PCI_OP_enable_msi{,x} on a device not being MSI/MSI-X capable). This is CVE-2013-0231 / XSA-43. Also make the two messages uniform in both their wording and severity. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Reviewed-by: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx> Cheers, Vinson -- To unsubscribe from this list: send the line "unsubscribe stable" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html