Re: [stable request 3.4] xen-pciback: rate limit error messages from xen_pcibk_enable_msi{,x}()

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, Jun 04, 2013 at 02:02:50PM -0700, Vinson Lee wrote:
> Hi,
> 
> This patch, which addresses CVE-2013-0231 and originally backported to
> 3.7.10, seems to have been missed for the 3.4 kernel. This patch is
> already in 3.7.5.z and 3.2.y.
> 
> commit 51ac8893a7a51b196501164e645583bf78138699
> Author: Jan Beulich <jbeulich@xxxxxxxx>
> Date:   Wed Feb 6 10:30:38 2013 -0500
> 
>     xen-pciback: rate limit error messages from xen_pcibk_enable_msi{,x}()
> 
>     ... as being guest triggerable (e.g. by invoking
>     XEN_PCI_OP_enable_msi{,x} on a device not being MSI/MSI-X capable).
> 
>     This is CVE-2013-0231 / XSA-43.
> 
>     Also make the two messages uniform in both their wording and severity.
> 
>     Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
>     Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
>     Reviewed-by: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>

It breaks the build on 3.4, so I can't apply it.  Can someone please
backport it (and TEST IT) and send it so that I can apply it?

thanks,

greg k-h
--
To unsubscribe from this list: send the line "unsubscribe stable" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [Linux Kernel]     [Kernel Development Newbies]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite Hiking]     [Linux Kernel]     [Linux SCSI]