Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 2 Aug 2016 02:07:56 +0000 (UTC)
From:      Jason Unovitch <junovitch@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r419463 - head/security/vuxml
Message-ID:  <201608020207.u7227u6A000490@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: junovitch
Date: Tue Aug  2 02:07:56 2016
New Revision: 419463
URL: https://svnweb.freebsd.org/changeset/ports/419463

Log:
  Document Xen Security Advisories (XSAs 182, 183, and 184)
  
  PR:		211482
  Security:	CVE-2016-5403
  Security:	CVE-2016-6259
  Security:	CVE-2016-6258
  Security:	https://vuxml.FreeBSD.org/freebsd/06574c62-5854-11e6-b334-002590263bf5.html
  Security:	https://vuxml.FreeBSD.org/freebsd/04cf89e3-5854-11e6-b334-002590263bf5.html
  Security:	https://vuxml.FreeBSD.org/freebsd/032aa524-5854-11e6-b334-002590263bf5.html

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Mon Aug  1 23:28:21 2016	(r419462)
+++ head/security/vuxml/vuln.xml	Tue Aug  2 02:07:56 2016	(r419463)
@@ -58,6 +58,105 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="06574c62-5854-11e6-b334-002590263bf5">
+    <topic>xen-tools -- virtio: unbounded memory allocation issue</topic>
+    <affects>
+      <package>
+	<name>xen-tools</name>
+	<range><lt>4.7.0_4</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>The Xen Project reports:</p>
+	<blockquote cite="http://xenbits.xen.org/xsa/advisory-184.html">;
+	  <p>A guest can submit virtio requests without bothering to wait for
+	    completion and is therefore not bound by virtqueue size...</p>
+	  <p>A malicious guest administrator can cause unbounded memory
+	    allocation in QEMU, which can cause an Out-of-Memory condition
+	    in the domain running qemu. Thus, a malicious guest administrator
+	    can cause a denial of service affecting the whole host.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2016-5403</cvename>
+      <freebsdpr>ports/211482</freebsdpr>
+      <url>http://xenbits.xen.org/xsa/advisory-184.html</url>;
+    </references>
+    <dates>
+      <discovery>2016-07-27</discovery>
+      <entry>2016-08-02</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="04cf89e3-5854-11e6-b334-002590263bf5">
+    <topic>xen-kernel -- x86: Missing SMAP whitelisting in 32-bit exception / event delivery</topic>
+    <affects>
+      <package>
+	<name>xen-kernel</name>
+	<range><gt>4.5</gt><lt>4.7.0_3</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>The Xen Project reports:</p>
+	<blockquote cite="http://xenbits.xen.org/xsa/advisory-183.html">;
+	  <p>Supervisor Mode Access Prevention is a hardware feature designed
+	    to make an Operating System more robust, by raising a pagefault
+	    rather than accidentally following a pointer into userspace.
+	    However, legitimate accesses into userspace require whitelisting,
+	    and the exception delivery mechanism for 32bit PV guests wasn't
+	    whitelisted.</p>
+	  <p>A malicious 32-bit PV guest kernel can trigger a safety check,
+	    crashing the hypervisor and causing a denial of service to other
+	    VMs on the host.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2016-6259</cvename>
+      <freebsdpr>ports/211482</freebsdpr>
+      <url>http://xenbits.xen.org/xsa/advisory-183.html</url>;
+    </references>
+    <dates>
+      <discovery>2016-07-26</discovery>
+      <entry>2016-08-02</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="032aa524-5854-11e6-b334-002590263bf5">
+    <topic>xen-kernel -- x86: Privilege escalation in PV guests</topic>
+    <affects>
+      <package>
+	<name>xen-kernel</name>
+	<range><lt>4.7.0_3</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>The Xen Project reports:</p>
+	<blockquote cite="http://xenbits.xen.org/xsa/advisory-182.html">;
+	  <p>The PV pagetable code has fast-paths for making updates to
+	    pre-existing pagetable entries, to skip expensive re-validation
+	    in safe cases (e.g. clearing only Access/Dirty bits). The bits
+	    considered safe were too broad, and not actually safe.</p>
+	  <p>A malicous PV guest administrator can escalate their privilege to
+	    that of the host.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2016-6258</cvename>
+      <freebsdpr>ports/211482</freebsdpr>
+      <url>http://xenbits.xen.org/xsa/advisory-182.html</url>;
+    </references>
+    <dates>
+      <discovery>2016-07-26</discovery>
+      <entry>2016-08-02</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="cb5189eb-572f-11e6-b334-002590263bf5">
     <topic>libidn -- mulitiple vulnerabilities</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201608020207.u7227u6A000490>