Date: Tue, 25 Oct 2016 17:51:50 +0000 (UTC) From: Mark Felder <feld@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r424639 - head/security/vuxml Message-ID: <201610251751.u9PHpoeE092116@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: feld Date: Tue Oct 25 17:51:49 2016 New Revision: 424639 URL: https://svnweb.freebsd.org/changeset/ports/424639 Log: Document FreeBSD-SA-16:32.bhyve Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Tue Oct 25 17:48:38 2016 (r424638) +++ head/security/vuxml/vuln.xml Tue Oct 25 17:51:49 2016 (r424639) @@ -58,6 +58,38 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="a479a725-9adb-11e6-a298-14dae9d210b8"> + <topic>FreeBSD -- bhyve - privilege escalation vulnerability</topic> + <affects> + <package> + <name>FreeBSD</name> + <range><ge>11.0</ge><lt>11.0_2</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <h1>Problem Description:</h1> + <p>An unchecked array reference in the VGA device emulation + code could potentially allow guests access to the heap of + the bhyve process. Since the bhyve process is running as + root, this may allow guests to obtain full control of the + hosts they are running on.</p> + <h1>Impact:</h1> + <p>For bhyve virtual machines with the "fbuf" framebuffer + device configured, if exploited, a malicious guest could + obtain full access to not just the host system, but to other + virtual machines running on the system.</p> + </body> + </description> + <references> + <freebsdsa>SA-16:32.bhyve</freebsdsa> + </references> + <dates> + <discovery>2016-10-25</discovery> + <entry>2016-10-25</entry> + </dates> + </vuln> + <vuln vid="2482c798-93c6-11e6-846f-bc5ff4fb5ea1"> <topic>flash -- multiple vulnerabilities</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201610251751.u9PHpoeE092116>