On Tue, Jun 04, 2013 at 02:02:50PM -0700, Vinson Lee wrote: > Hi, > > This patch, which addresses CVE-2013-0231 and originally backported to > 3.7.10, seems to have been missed for the 3.4 kernel. This patch is > already in 3.7.5.z and 3.2.y. > > commit 51ac8893a7a51b196501164e645583bf78138699 > Author: Jan Beulich <jbeulich@xxxxxxxx> > Date: Wed Feb 6 10:30:38 2013 -0500 > > xen-pciback: rate limit error messages from xen_pcibk_enable_msi{,x}() > > ... as being guest triggerable (e.g. by invoking > XEN_PCI_OP_enable_msi{,x} on a device not being MSI/MSI-X capable). > > This is CVE-2013-0231 / XSA-43. > > Also make the two messages uniform in both their wording and severity. > > Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> > Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> > Reviewed-by: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx> It breaks the build on 3.4, so I can't apply it. Can someone please backport it (and TEST IT) and send it so that I can apply it? thanks, greg k-h -- To unsubscribe from this list: send the line "unsubscribe stable" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html