diff options
author | feld <feld@FreeBSD.org> | 2016-12-07 04:03:52 +0800 |
---|---|---|
committer | feld <feld@FreeBSD.org> | 2016-12-07 04:03:52 +0800 |
commit | 9829834214d7a8b7fe111e3b41245c5b206bce4f (patch) | |
tree | a5750121422e256f1af4837a23edad7561fb5015 /security | |
parent | 8a788ede4ec7e455b67a1e54c25635f3bcd43c9a (diff) | |
download | freebsd-ports-gnome-9829834214d7a8b7fe111e3b41245c5b206bce4f.tar.gz freebsd-ports-gnome-9829834214d7a8b7fe111e3b41245c5b206bce4f.tar.zst freebsd-ports-gnome-9829834214d7a8b7fe111e3b41245c5b206bce4f.zip |
Document FreeBSD-SA-16:38.bhyve
Security: CVE-2016-1889
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 36 |
1 files changed, 36 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index e41addc4e20b..04cab6d568f2 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,42 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="e722e3c6-bbee-11e6-b1cf-14dae9d210b8"> + <topic>FreeBSD -- bhyve(8) virtual machine escape</topic> + <affects> + <package> + <name>FreeBSD</name> + <range><ge>11.0</ge><lt>11.0_4</lt></range> + <range><ge>10.3</ge><lt>10.3_13</lt></range> + <range><ge>10.2</ge><lt>10.2_26</lt></range> + <range><ge>10.1</ge><lt>10.1_43</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <h1>Problem Description:</h1> + <p>The bounds checking of accesses to guest memory greater + than 4GB by device emulations is subject to integer + overflow.</p> + <h1>Impact:</h1> + <p>For a bhyve virtual machine with more than 3GB of guest + memory configured, a malicious guest could craft device + descriptors that could give it access to the heap of the + bhyve process. Since the bhyve process is running as root, + this may allow guests to obtain full control of the hosts + they're running on.</p> + </body> + </description> + <references> + <cvename>CVE-2016-1889</cvename> + <freebsdsa>SA-16:38.bhyve</freebsdsa> + </references> + <dates> + <discovery>2016-12-06</discovery> + <entry>2016-12-06</entry> + </dates> + </vuln> + <vuln vid="0282269d-bbee-11e6-b1cf-14dae9d210b8"> <topic>FreeBSD -- link_ntoa(3) buffer overflow</topic> <affects> |