aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorjunovitch <junovitch@FreeBSD.org>2015-11-11 11:22:07 +0800
committerjunovitch <junovitch@FreeBSD.org>2015-11-11 11:22:07 +0800
commit900083d812f7a0b96ac4cad081ae2b111df024e3 (patch)
treedd89f14fbd2197b53eae9c235b75782be3e2d58e /security
parentd9e34235e50b6f72d8dba3294b15eaba83c47677 (diff)
downloadfreebsd-ports-gnome-900083d812f7a0b96ac4cad081ae2b111df024e3.tar.gz
freebsd-ports-gnome-900083d812f7a0b96ac4cad081ae2b111df024e3.tar.zst
freebsd-ports-gnome-900083d812f7a0b96ac4cad081ae2b111df024e3.zip
Document Xen XSAs-{142,148,149,150,151,152,153}
Security: CVE-2015-7311 Security: CVE-2015-7835 Security: CVE-2015-7969 Security: CVE-2015-7970 Security: CVE-2015-7971 Security: CVE-2015-7972 Security: https://vuxml.FreeBSD.org/freebsd/301b04d7-881c-11e5-ab94-002590263bf5.html Security: https://vuxml.FreeBSD.org/freebsd/3d9f6260-881d-11e5-ab94-002590263bf5.html Security: https://vuxml.FreeBSD.org/freebsd/83350009-881e-11e5-ab94-002590263bf5.html Security: https://vuxml.FreeBSD.org/freebsd/c0e76d33-8821-11e5-ab94-002590263bf5.html Security: https://vuxml.FreeBSD.org/freebsd/e3792855-881f-11e5-ab94-002590263bf5.html Security: https://vuxml.FreeBSD.org/freebsd/e4848ca4-8820-11e5-ab94-002590263bf5.html Security: https://vuxml.FreeBSD.org/freebsd/fc1f8795-881d-11e5-ab94-002590263bf5.html
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml241
1 files changed, 241 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index c334a63d4555..8b3f1f91bf4b 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -58,6 +58,247 @@ Notes:
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="c0e76d33-8821-11e5-ab94-002590263bf5">
+ <topic>xen-tools -- populate-on-demand balloon size inaccuracy can crash guests</topic>
+ <affects>
+ <package>
+ <name>xen-tools</name>
+ <range><ge>3.4</ge><lt>4.5.1_2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Xen Project reports:</p>
+ <blockquote cite="http://xenbits.xen.org/xsa/advisory-153.html">
+ <p>Guests configured with PoD might be unstable, especially under
+ load. In an affected guest, an unprivileged guest user might be
+ able to cause a guest crash, perhaps simply by applying load so
+ as to cause heavy memory pressure within the guest.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2015-7972</cvename>
+ <url>http://xenbits.xen.org/xsa/advisory-153.html</url>
+ </references>
+ <dates>
+ <discovery>2015-10-29</discovery>
+ <entry>2015-11-11</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="e4848ca4-8820-11e5-ab94-002590263bf5">
+ <topic>xen-kernel -- some pmu and profiling hypercalls log without rate limiting</topic>
+ <affects>
+ <package>
+ <name>xen-kernel</name>
+ <range><ge>3.2</ge><lt>4.5.1_1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Xen Project reports:</p>
+ <blockquote cite="http://xenbits.xen.org/xsa/advisory-152.html">
+ <p>HYPERCALL_xenoprof_op and HYPERVISOR_xenpmu_op log some errors and
+ attempts at invalid operations. These log messages are not
+ rate-limited, even though they can be triggered by guests.</p>
+ <p>A malicious guest could cause repeated logging to the hypervisor
+ console, leading to a Denial of Service attack.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2015-7971</cvename>
+ <url>http://xenbits.xen.org/xsa/advisory-152.html</url>
+ </references>
+ <dates>
+ <discovery>2015-10-29</discovery>
+ <entry>2015-11-11</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="e3792855-881f-11e5-ab94-002590263bf5">
+ <topic>xen-kernel -- leak of per-domain profiling-related vcpu pointer array</topic>
+ <affects>
+ <package>
+ <name>xen-kernel</name>
+ <range><ge>4.0</ge><lt>4.5.1_1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Xen Project reports:</p>
+ <blockquote cite="http://xenbits.xen.org/xsa/advisory-151.html">
+ <p>A domain's xenoprofile state contains an array of per-vcpu
+ information... This array is leaked on domain teardown. This memory
+ leak could -- over time -- exhaust the host's memory.</p>
+ <p>The following parties can mount a denial of service attack
+ affecting the whole system:</p>
+ <ul>
+ <li>A malicious guest administrator via XENOPROF_get_buffer.</li>
+ <li>A domain given suitable privilege over another domain via
+ XENOPROF_set_passive (this would usually be a domain being
+ used to profile another domain, eg with the xenoprof tool).</li>
+ </ul>
+ <p>The ability to also restart or create suitable domains is also
+ required to fully exploit the issue. Without this the leak is
+ limited to a small multiple of the maximum number of vcpus for the
+ domain.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2015-7969</cvename>
+ <url>http://xenbits.xen.org/xsa/advisory-151.html</url>
+ </references>
+ <dates>
+ <discovery>2015-10-29</discovery>
+ <entry>2015-11-11</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="83350009-881e-11e5-ab94-002590263bf5">
+ <topic>xen-kernel -- Long latency populate-on-demand operation is not preemptible</topic>
+ <affects>
+ <package>
+ <name>xen-kernel</name>
+ <range><ge>3.4</ge><lt>4.5.1_1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Xen Project reports:</p>
+ <blockquote cite="http://xenbits.xen.org/xsa/advisory-150.html">
+ <p>When running an HVM domain in Populate-on-Demand mode, Xen would
+ sometimes search the domain for memory to reclaim, in response to
+ demands for population of other pages in the same domain. This
+ search runs without preemption. The guest can, by suitable
+ arrangement of its memory contents, create a situation where this
+ search is a time-consuming linear scan of the guest's address
+ space.</p>
+ <p>A malicious HVM guest administrator can cause a denial of service.
+ Specifically, prevent use of a physical CPU for a significant
+ period.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2015-7970</cvename>
+ <url>http://xenbits.xen.org/xsa/advisory-150.html</url>
+ </references>
+ <dates>
+ <discovery>2015-10-29</discovery>
+ <entry>2015-11-11</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="fc1f8795-881d-11e5-ab94-002590263bf5">
+ <topic>xen-kernel -- leak of main per-domain vcpu pointer array</topic>
+ <affects>
+ <package>
+ <name>xen-kernel</name>
+ <range><lt>4.5.1_1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Xen Project reports:</p>
+ <blockquote cite="http://xenbits.xen.org/xsa/advisory-149.html">
+ <p>A domain's primary array of vcpu pointers can be allocated by a
+ toolstack exactly once in the lifetime of a domain via the
+ XEN_DOMCTL_max_vcpus hypercall. This array is leaked on domain
+ teardown. This memory leak could -- over time -- exhaust the host's
+ memory.</p>
+ <p>A domain given partial management control via XEN_DOMCTL_max_vcpus
+ can mount a denial of service attack affecting the whole system. The
+ ability to also restart or create suitable domains is also required
+ to fully exploit the issue. Without this the leak is limited to a
+ small multiple of the maximum number of vcpus for the domain. The
+ maximum leak is 64kbytes per domain (re)boot (less on ARM).</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2015-7969</cvename>
+ <url>http://xenbits.xen.org/xsa/advisory-149.html</url>
+ </references>
+ <dates>
+ <discovery>2015-10-29</discovery>
+ <entry>2015-11-11</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="3d9f6260-881d-11e5-ab94-002590263bf5">
+ <topic>xen-kernel -- Uncontrolled creation of large page mappings by PV guests</topic>
+ <affects>
+ <package>
+ <name>xen-kernel</name>
+ <range><ge>3.4</ge><lt>4.5.1_1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Xen Project reports:</p>
+ <blockquote cite="http://xenbits.xen.org/xsa/advisory-148.html">
+ <p>The code to validate level 2 page table entries is bypassed when
+ certain conditions are satisfied. This means that a PV guest can
+ create writeable mappings using super page mappings. Such writeable
+ mappings can violate Xen intended invariants for pages which Xen is
+ supposed to keep read-only. This is possible even if the
+ "allowsuperpage" command line option is not used.</p>
+ <p>Malicious PV guest administrators can escalate privilege so as to
+ control the whole system.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2015-7835</cvename>
+ <url>http://xenbits.xen.org/xsa/advisory-148.html</url>
+ </references>
+ <dates>
+ <discovery>2015-10-29</discovery>
+ <entry>2015-11-11</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="301b04d7-881c-11e5-ab94-002590263bf5">
+ <topic>xen-tools -- libxl fails to honour readonly flag on disks with qemu-xen</topic>
+ <affects>
+ <package>
+ <name>xen-tools</name>
+ <range><ge>4.1</ge><lt>4.5.1_1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Xen Project reports:</p>
+ <blockquote cite="http://xenbits.xen.org/xsa/advisory-142.html">
+ <p>Callers of libxl can specify that a disk should be read-only to the
+ guest. However, there is no code in libxl to pass this information
+ to qemu-xen (the upstream-based qemu); and indeed there is no way in
+ qemu to make a disk read-only.</p>
+ <p>The vulnerability is exploitable only via devices emulated by the
+ device model, not the parallel PV devices for supporting PVHVM.
+ Normally the PVHVM device unplug protocol renders the emulated
+ devices inaccessible early in boot.</p>
+ <p>Malicious guest administrators or (in some situations) users may be
+ able to write to supposedly read-only disk images.</p>
+ <p>CDROM devices (that is, devices specified to be presented to the
+ guest as CDROMs, regardless of the nature of the backing storage on
+ the host) are not affected.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2015-7311</cvename>
+ <url>http://xenbits.xen.org/xsa/advisory-142.html</url>
+ </references>
+ <dates>
+ <discovery>2015-09-22</discovery>
+ <entry>2015-11-11</entry>
+ </dates>
+ </vuln>
+
<vuln vid="2f7f4db2-8819-11e5-ab94-002590263bf5">
<topic>p5-HTML-Scrubber -- XSS vulnerability</topic>
<affects>