svn commit: r418049 - head/security/vuxml

Jason Unovitch junovitch at FreeBSD.org
Mon Jul 4 19:02:28 UTC 2016


Author: junovitch
Date: Mon Jul  4 19:02:26 2016
New Revision: 418049
URL: https://svnweb.freebsd.org/changeset/ports/418049

Log:
  Document Xen Security Advisories (XSAs 173, 175, 176, 178, 179, and 180).
  
  XSAs 171, 172, 174, and 181 are not applicable to FreeBSD.
  
  Discussed with:	royger
  Security:	CVE-2014-3672
  Security:	CVE-2016-3710
  Security:	CVE-2016-3712
  Security:	CVE-2016-4963
  Security:	CVE-2016-4480
  Security:	CVE-2016-4962
  Security:	CVE-2016-3960
  Security:	https://vuxml.FreeBSD.org/freebsd/e800cd4b-4212-11e6-942d-bc5ff45d0f28.html
  Security:	https://vuxml.FreeBSD.org/freebsd/e6ce6f50-4212-11e6-942d-bc5ff45d0f28.html
  Security:	https://vuxml.FreeBSD.org/freebsd/e589ae90-4212-11e6-942d-bc5ff45d0f28.html
  Security:	https://vuxml.FreeBSD.org/freebsd/e43b210a-4212-11e6-942d-bc5ff45d0f28.html
  Security:	https://vuxml.FreeBSD.org/freebsd/e2fca11b-4212-11e6-942d-bc5ff45d0f28.html
  Security:	https://vuxml.FreeBSD.org/freebsd/d51ced72-4212-11e6-942d-bc5ff45d0f28.html

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Mon Jul  4 18:14:18 2016	(r418048)
+++ head/security/vuxml/vuln.xml	Mon Jul  4 19:02:26 2016	(r418049)
@@ -58,6 +58,214 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+  <vuln vid="e800cd4b-4212-11e6-942d-bc5ff45d0f28">
+    <topic>xen-tools -- Unrestricted qemu logging</topic>
+    <affects>
+      <package>
+	<name>xen-tools</name>
+	<range><lt>4.7.0_2</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">
+	<p>The Xen Project reports:</p>
+	<blockquote cite="http://xenbits.xen.org/xsa/advisory-180.html">
+	  <p>When the libxl toolstack launches qemu for HVM guests, it pipes the
+	    output of stderr to a file in /var/log/xen.  This output is not
+	    rate-limited in any way.  The guest can easily cause qemu to print
+	    messages to stderr, causing this file to become arbitrarily large.
+	    </p>
+	  <p>The disk containing the logfile can be exausted, possibly causing a
+	    denial-of-service (DoS).</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2014-3672</cvename>
+      <url>http://xenbits.xen.org/xsa/advisory-180.html</url>
+    </references>
+    <dates>
+      <discovery>2016-05-23</discovery>
+      <entry>2016-07-04</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="e6ce6f50-4212-11e6-942d-bc5ff45d0f28">
+    <topic>xen-tools -- QEMU: Banked access to VGA memory (VBE) uses inconsistent bounds checks</topic>
+    <affects>
+      <package>
+	<name>xen-tools</name>
+	<range><lt>4.7.0_2</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">
+	<p>The Xen Project reports:</p>
+	<blockquote cite="http://xenbits.xen.org/xsa/advisory-179.html">
+	  <p>Qemu VGA module allows banked access to video memory using the
+	    window at 0xa00000 and it supports different access modes with
+	    different address calculations.</p>
+	  <p>Qemu VGA module allows guest to edit certain registers in 'vbe'
+	    and 'vga' modes.</p>
+	  <p>A privileged guest user could use CVE-2016-3710 to exceed the bank
+	    address window and write beyond the said memory area, potentially
+	    leading to arbitrary code execution with privileges of the Qemu
+	    process.  If the system is not using stubdomains, this will be in
+	    domain 0.</p>
+	  <p>A privileged guest user could use CVE-2016-3712 to cause potential
+	    integer overflow or OOB read access issues in Qemu, resulting in a DoS
+	    of the guest itself.  More dangerous effect, such as data leakage or
+	    code execution, are not known but cannot be ruled out.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2016-3710</cvename>
+      <cvename>CVE-2016-3712</cvename>
+      <url>http://xenbits.xen.org/xsa/advisory-179.html</url>
+    </references>
+    <dates>
+      <discovery>2016-05-09</discovery>
+      <entry>2016-07-04</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="e589ae90-4212-11e6-942d-bc5ff45d0f28">
+    <topic>xen-tools -- Unsanitised driver domain input in libxl device handling</topic>
+    <affects>
+      <package>
+	<name>xen-tools</name>
+	<range><lt>4.7.0_1</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">
+	<p>The Xen Project reports:</p>
+	<blockquote cite="http://xenbits.xen.org/xsa/advisory-178.html">
+	  <p>libxl's device-handling code freely uses and trusts information
+	    from the backend directories in xenstore.</p>
+	  <p>A malicious driver domain can deny service to management tools.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2016-4963</cvename>
+      <url>http://xenbits.xen.org/xsa/advisory-178.html</url>
+    </references>
+    <dates>
+      <discovery>2016-06-02</discovery>
+      <entry>2016-07-04</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="e43b210a-4212-11e6-942d-bc5ff45d0f28">
+    <topic>xen-kernel -- x86 software guest page walk PS bit handling flaw</topic>
+    <affects>
+      <package>
+	<name>xen-kernel</name>
+	<range><lt>4.7.0</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">
+	<p>The Xen Project reports:</p>
+	<blockquote cite="http://xenbits.xen.org/xsa/advisory-176.html">
+	  <p>The Page Size (PS) page table entry bit exists at all page table
+	    levels other than L1.  Its meaning is reserved in L4, and
+	    conditionally reserved in L3 and L2 (depending on hardware
+	    capabilities).  The software page table walker in the hypervisor,
+	    however, so far ignored that bit in L4 and (on respective hardware)
+	    L3 entries, resulting in pages to be treated as page tables which
+	    the guest OS may not have designated as such.  If the page in
+	    question is writable by an unprivileged user, then that user will
+	    be able to map arbitrary guest memory.</p>
+	  <p>On vulnerable OSes, guest user mode code may be able to establish
+	    mappings of arbitrary memory inside the guest, allowing it to
+	    elevate its privileges inside the guest.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2016-4480</cvename>
+      <url>http://xenbits.xen.org/xsa/advisory-176.html</url>
+    </references>
+    <dates>
+      <discovery>2016-05-17</discovery>
+      <entry>2016-07-04</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="e2fca11b-4212-11e6-942d-bc5ff45d0f28">
+    <topic>xen-tools -- Unsanitised guest input in libxl device handling code</topic>
+    <affects>
+      <package>
+	<name>xen-tools</name>
+	<range><lt>4.7.0_1</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">
+	<p>The Xen Project reports:</p>
+	<blockquote cite="http://xenbits.xen.org/xsa/advisory-175.html">
+	  <p>Various parts of libxl device-handling code inappropriately use
+	    information from (partially) guest controlled areas of xenstore.</p>
+	  <p>A malicious guest administrator can cause denial of service by
+	    resource exhaustion.</p>
+	  <p>A malicious guest administrator can confuse and/or deny service to
+	    management facilities.</p>
+	  <p>A malicious guest administrator of a guest configured with channel
+	    devices may be able to escalate their privilege to that of the
+	    backend domain (i.e., normally, to that of the host).</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2016-4962</cvename>
+      <url>http://xenbits.xen.org/xsa/advisory-175.html</url>
+    </references>
+    <dates>
+      <discovery>2016-06-02</discovery>
+      <entry>2016-07-04</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="d51ced72-4212-11e6-942d-bc5ff45d0f28">
+    <topic>xen-kernel -- x86 shadow pagetables: address width overflow</topic>
+    <affects>
+      <package>
+	<name>xen-kernel</name>
+	<range><ge>3.4</ge><lt>4.7.0</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">
+	<p>The Xen Project reports:</p>
+	<blockquote cite="http://xenbits.xen.org/xsa/advisory-173.html">
+	  <p>In the x86 shadow pagetable code, the guest frame number of a
+	    superpage mapping is stored in a 32-bit field.  If a shadowed guest
+	    can cause a superpage mapping of a guest-physical address at or
+	    above 2^44 to be shadowed, the top bits of the address will be lost,
+	    causing an assertion failure or NULL dereference later on, in code
+	    that removes the shadow.</p>
+	  <p>A HVM guest using shadow pagetables can cause the host to crash.
+	    </p>
+	  <p>A PV guest using shadow pagetables (i.e. being migrated) with PV
+	    superpages enabled (which is not the default) can crash the host, or
+	    corrupt hypervisor memory, and so a privilege escalation cannot be
+	    ruled out.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2016-3960</cvename>
+      <url>http://xenbits.xen.org/xsa/advisory-173.html</url>
+    </references>
+    <dates>
+      <discovery>2016-04-18</discovery>
+      <entry>2016-07-04</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="313e9557-41e8-11e6-ab34-002590263bf5">
     <topic>wireshark -- multiple vulnerabilities</topic>
     <affects>


More information about the svn-ports-head mailing list