SB2016081108 - Input validation error in xen (Alpine package)
Published: August 11, 2016
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Input validation error (CVE-ID: CVE-2016-6259)
The vulnerability allows a local non-authenticated attacker to perform a denial of service (DoS) attack.
Xen 4.5.x through 4.7.x do not implement Supervisor Mode Access Prevention (SMAP) whitelisting in 32-bit exception and event delivery, which allows local 32-bit PV guest OS kernels to cause a denial of service (hypervisor and VM crash) by triggering a safety check.
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=68368249e3421886c66d79df3bd184f6ff617041
- https://git.alpinelinux.org/aports/commit/?id=59d51c1852e15d7d5e6d20ca1c5e19b137c2ea37
- https://git.alpinelinux.org/aports/commit/?id=93cedf0264ea23d61efd07fa82126f2f9e375b20
- https://git.alpinelinux.org/aports/commit/?id=d0a7fcca4e82f4ff531083fa762975ee6b0ec9f4