SB2016022503 - Input validation error in linux-grsec (Alpine package)



SB2016022503 - Input validation error in linux-grsec (Alpine package)

Published: February 25, 2016

Security Bulletin ID SB2016022503
Severity
Low
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Local access
Highest impact Denial of service

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Input validation error (CVE-ID: CVE-2015-8552)

The vulnerability allows a local privileged user to perform a denial of service (DoS) attack.

The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka "Linux pciback missing sanity checks."


Remediation

Install update from vendor's website.