Date: Sat, 2 Jan 2016 13:23:55 +0000 (UTC) From: Jason Unovitch <junovitch@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r405069 - head/security/vuxml Message-ID: <201601021323.u02DNtDZ075543@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: junovitch Date: Sat Jan 2 13:23:54 2016 New Revision: 405069 URL: https://svnweb.freebsd.org/changeset/ports/405069 Log: Document several older QEMU vulnerabilities Security: CVE-2015-7295 Security: CVE-2015-5278 Security: CVE-2015-5279 Security: CVE-2015-6855 Security: CVE-2015-6815 Security: CVE-2015-5239 Security: https://vuxml.FreeBSD.org/freebsd/42cbd1e8-b152-11e5-9728-002590263bf5.html Security: https://vuxml.FreeBSD.org/freebsd/6aa3322f-b150-11e5-9728-002590263bf5.html Security: https://vuxml.FreeBSD.org/freebsd/bbc97005-b14e-11e5-9728-002590263bf5.html Security: https://vuxml.FreeBSD.org/freebsd/10bf8eed-b14d-11e5-9728-002590263bf5.html Security: https://vuxml.FreeBSD.org/freebsd/8a560bcf-b14b-11e5-9728-002590263bf5.html Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Sat Jan 2 12:06:22 2016 (r405068) +++ head/security/vuxml/vuln.xml Sat Jan 2 13:23:54 2016 (r405069) @@ -58,6 +58,212 @@ Notes: --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="42cbd1e8-b152-11e5-9728-002590263bf5"> + <topic>qemu -- denial of service vulnerability in virtio-net support</topic> + <affects> + <package> + <name>qemu</name> + <name>qemu-devel</name> + <range><lt>2.4.1</lt></range> + </package> + <package> + <name>qemu-sbruno</name> + <name>qemu-user-static</name> + <range><lt>2.5.50.g20151224</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Prasad J Pandit, Red Hat Product Security Team, reports:</p> + <blockquote cite="http://www.openwall.com/lists/oss-security/2015/09/18/5"> + <p>Qemu emulator built with the Virtual Network Device(virtio-net) + support is vulnerable to a DoS issue. It could occur while receiving + large packets over the tuntap/macvtap interfaces and when guest's + virtio-net driver did not support big/mergeable receive buffers.</p> + <p>An attacker on the local network could use this flaw to disable + guest's networking by sending a large number of jumbo frames to the + guest, exhausting all receive buffers and thus leading to a DoS + situation.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2015-7295</cvename> + <url>http://www.openwall.com/lists/oss-security/2015/09/18/5</url> + <url>http://git.qemu.org/?p=qemu.git;a=commit;h=696317f1895e836d53b670c7b77b7be93302ba08</url> + <url>https://github.com/seanbruno/qemu-bsd-user/commit/0cf33fb6b49a19de32859e2cdc6021334f448fb3</url> + </references> + <dates> + <discovery>2015-09-18</discovery> + <entry>2016-01-02</entry> + </dates> + </vuln> + + <vuln vid="6aa3322f-b150-11e5-9728-002590263bf5"> + <topic>qemu -- denial of service vulnerabilities in NE2000 NIC support</topic> + <affects> + <package> + <name>qemu</name> + <name>qemu-devel</name> + <range><lt>2.4.0.1</lt></range> + </package> + <package> + <name>qemu-sbruno</name> + <name>qemu-user-static</name> + <range><lt>2.5.50.g20151224</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Prasad J Pandit, Red Hat Product Security Team, reports:</p> + <blockquote cite="http://www.openwall.com/lists/oss-security/2015/09/15/2"> + <p>Qemu emulator built with the NE2000 NIC emulation support is + vulnerable to an infinite loop issue. It could occur when receiving + packets over the network.</p> + <p>A privileged user inside guest could use this flaw to crash the + Qemu instance resulting in DoS.</p> + </blockquote> + <blockquote cite="http://www.openwall.com/lists/oss-security/2015/09/15/3"> + <p>Qemu emulator built with the NE2000 NIC emulation support is + vulnerable to a heap buffer overflow issue. It could occur when + receiving packets over the network.</p> + <p>A privileged user inside guest could use this flaw to crash the + Qemu instance or potentially execute arbitrary code on the host.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2015-5278</cvename> + <cvename>CVE-2015-5279</cvename> + <url>http://www.openwall.com/lists/oss-security/2015/09/15/2</url> + <url>http://www.openwall.com/lists/oss-security/2015/09/15/3</url> + <url>http://git.qemu.org/?p=qemu.git;a=commit;h=5a1ccdfe44946e726b4c6fda8a4493b3931a68c1</url> + <url>https://github.com/seanbruno/qemu-bsd-user/commit/737d2b3c41d59eb8f94ab7eb419b957938f24943</url> + <url>http://git.qemu.org/?p=qemu.git;a=commit;h=7aa2bcad0ca837dd6d4bf4fa38a80314b4a6b755</url> + <url>https://github.com/seanbruno/qemu-bsd-user/commit/9bbdbc66e5765068dce76e9269dce4547afd8ad4</url> + </references> + <dates> + <discovery>2015-09-15</discovery> + <entry>2016-01-02</entry> + </dates> + </vuln> + + <vuln vid="bbc97005-b14e-11e5-9728-002590263bf5"> + <topic>qemu -- denial of service vulnerability in IDE disk/CD/DVD-ROM emulation</topic> + <affects> + <package> + <name>qemu</name> + <name>qemu-devel</name> + <range><lt>2.4.1</lt></range> + </package> + <package> + <name>qemu-sbruno</name> + <name>qemu-user-static</name> + <range><lt>2.5.50.g20151224</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Prasad J Pandit, Red Hat Product Security Team, reports:</p> + <blockquote cite="http://www.openwall.com/lists/oss-security/2015/09/10/1"> + <p>Qemu emulator built with the IDE disk and CD/DVD-ROM emulation + support is vulnerable to a divide by zero issue. It could occur + while executing an IDE command WIN_READ_NATIVE_MAX to determine + the maximum size of a drive.</p> + <p>A privileged user inside guest could use this flaw to crash the + Qemu instance resulting in DoS.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2015-6855</cvename> + <url>http://www.openwall.com/lists/oss-security/2015/09/10/1</url> + <url>http://git.qemu.org/?p=qemu.git;a=commit;h=63d761388d6fea994ca498c6e7a210851a99ad93</url> + <url>https://github.com/seanbruno/qemu-bsd-user/commit/d9033e1d3aa666c5071580617a57bd853c5d794a</url> + </references> + <dates> + <discovery>2015-09-09</discovery> + <entry>2016-01-02</entry> + </dates> + </vuln> + + <vuln vid="10bf8eed-b14d-11e5-9728-002590263bf5"> + <topic>qemu -- denial of service vulnerability in e1000 NIC support</topic> + <affects> + <package> + <name>qemu</name> + <name>qemu-devel</name> + <range><lt>2.4.0.1</lt></range> + </package> + <package> + <name>qemu-sbruno</name> + <name>qemu-user-static</name> + <range><lt>2.5.50.g20151224</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Prasad J Pandit, Red Hat Product Security Team, reports:</p> + <blockquote cite="http://www.openwall.com/lists/oss-security/2015/09/04/4"> + <p>Qemu emulator built with the e1000 NIC emulation support is + vulnerable to an infinite loop issue. It could occur while + processing transmit descriptor data when sending a network packet. + </p> + <p>A privileged user inside guest could use this flaw to crash the + Qemu instance resulting in DoS.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2015-6815</cvename> + <url>http://www.openwall.com/lists/oss-security/2015/09/04/4</url> + <url>http://git.qemu.org/?p=qemu.git;a=commit;h=3a56af1fbc17ff453f6e90fb08ce0c0e6fd0b61b</url> + <url>https://github.com/seanbruno/qemu-bsd-user/commit/b947ac2bf26479e710489739c465c8af336599e7</url> + </references> + <dates> + <discovery>2015-09-04</discovery> + <entry>2016-01-02</entry> + </dates> + </vuln> + + <vuln vid="8a560bcf-b14b-11e5-9728-002590263bf5"> + <topic>qemu -- denial of service vulnerability in VNC</topic> + <affects> + <package> + <name>qemu</name> + <name>qemu-devel</name> + <range><lt>2.1.0</lt></range> + </package> + <package> + <name>qemu-sbruno</name> + <name>qemu-user-static</name> + <range><lt>2.2.50.g20141230</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Prasad J Pandit, Red Hat Product Security Team, reports:</p> + <blockquote cite="http://www.openwall.com/lists/oss-security/2015/09/02/7"> + <p>Qemu emulator built with the VNC display driver is vulnerable to an + infinite loop issue. It could occur while processing a + CLIENT_CUT_TEXT message with specially crafted payload message.</p> + <p>A privileged guest user could use this flaw to crash the Qemu + process on the host, resulting in DoS.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2015-5239</cvename> + <url>http://www.openwall.com/lists/oss-security/2015/09/02/7</url> + <url>http://git.qemu.org/?p=qemu.git;a=commit;h=f9a70e79391f6d7c2a912d785239ee8effc1922d</url> + <url>https://github.com/seanbruno/qemu-bsd-user/commit/f9a70e79391f6d7c2a912d785239ee8effc1922d</url> + </references> + <dates> + <discovery>2014-06-30</discovery> + <entry>2016-01-02</entry> + </dates> + </vuln> + <vuln vid="2b3b4c27-b0c7-11e5-8d13-bc5ff45d0f28"> <topic>qemu -- buffer overflow vulnerability in VNC</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201601021323.u02DNtDZ075543>