aboutsummaryrefslogtreecommitdiffstats
path: root/security/vuxml
diff options
context:
space:
mode:
authorfeld <feld@FreeBSD.org>2016-12-07 04:03:52 +0800
committerfeld <feld@FreeBSD.org>2016-12-07 04:03:52 +0800
commit9829834214d7a8b7fe111e3b41245c5b206bce4f (patch)
treea5750121422e256f1af4837a23edad7561fb5015 /security/vuxml
parent8a788ede4ec7e455b67a1e54c25635f3bcd43c9a (diff)
downloadfreebsd-ports-graphics-9829834214d7a8b7fe111e3b41245c5b206bce4f.tar.gz
freebsd-ports-graphics-9829834214d7a8b7fe111e3b41245c5b206bce4f.tar.zst
freebsd-ports-graphics-9829834214d7a8b7fe111e3b41245c5b206bce4f.zip
Document FreeBSD-SA-16:38.bhyve
Security: CVE-2016-1889
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln.xml36
1 files changed, 36 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index e41addc4e20..04cab6d568f 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -58,6 +58,42 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="e722e3c6-bbee-11e6-b1cf-14dae9d210b8">
+ <topic>FreeBSD -- bhyve(8) virtual machine escape</topic>
+ <affects>
+ <package>
+ <name>FreeBSD</name>
+ <range><ge>11.0</ge><lt>11.0_4</lt></range>
+ <range><ge>10.3</ge><lt>10.3_13</lt></range>
+ <range><ge>10.2</ge><lt>10.2_26</lt></range>
+ <range><ge>10.1</ge><lt>10.1_43</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <h1>Problem Description:</h1>
+ <p>The bounds checking of accesses to guest memory greater
+ than 4GB by device emulations is subject to integer
+ overflow.</p>
+ <h1>Impact:</h1>
+ <p>For a bhyve virtual machine with more than 3GB of guest
+ memory configured, a malicious guest could craft device
+ descriptors that could give it access to the heap of the
+ bhyve process. Since the bhyve process is running as root,
+ this may allow guests to obtain full control of the hosts
+ they're running on.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2016-1889</cvename>
+ <freebsdsa>SA-16:38.bhyve</freebsdsa>
+ </references>
+ <dates>
+ <discovery>2016-12-06</discovery>
+ <entry>2016-12-06</entry>
+ </dates>
+ </vuln>
+
<vuln vid="0282269d-bbee-11e6-b1cf-14dae9d210b8">
<topic>FreeBSD -- link_ntoa(3) buffer overflow</topic>
<affects>