Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 4 Dec 2016 19:35:14 +0000 (UTC)
From:      Jason Unovitch <junovitch@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r427795 - head/security/vuxml
Message-ID:  <201612041935.uB4JZEbD065092@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: junovitch
Date: Sun Dec  4 19:35:14 2016
New Revision: 427795
URL: https://svnweb.freebsd.org/changeset/ports/427795

Log:
  Document Xen Security Advisories (XSAs 185-188, 190-195, 197-198)
  
  PR:		214936
  Security:	CVE-2016-7092
  Security:	CVE-2016-7093
  Security:	CVE-2016-7094
  Security:	CVE-2016-7154
  Security:	CVE-2016-7777
  Security:	CVE-2016-9379
  Security:	CVE-2016-9380
  Security:	CVE-2016-9381
  Security:	CVE-2016-9382
  Security:	CVE-2016-9383
  Security:	CVE-2016-9384
  Security:	CVE-2016-9385
  Security:	CVE-2016-9386
  Security:	https://vuxml.FreeBSD.org/freebsd/45ca25b5-ba4d-11e6-ae1b-002590263bf5.html
  Security:	https://vuxml.FreeBSD.org/freebsd/49211361-ba4d-11e6-ae1b-002590263bf5.html
  Security:	https://vuxml.FreeBSD.org/freebsd/4aae54be-ba4d-11e6-ae1b-002590263bf5.html
  Security:	https://vuxml.FreeBSD.org/freebsd/4d7cf654-ba4d-11e6-ae1b-002590263bf5.html
  Security:	https://vuxml.FreeBSD.org/freebsd/50ac2e96-ba4d-11e6-ae1b-002590263bf5.html
  Security:	https://vuxml.FreeBSD.org/freebsd/523bb0b7-ba4d-11e6-ae1b-002590263bf5.html
  Security:	https://vuxml.FreeBSD.org/freebsd/53dbd096-ba4d-11e6-ae1b-002590263bf5.html
  Security:	https://vuxml.FreeBSD.org/freebsd/5555120d-ba4d-11e6-ae1b-002590263bf5.html
  Security:	https://vuxml.FreeBSD.org/freebsd/56f0f11e-ba4d-11e6-ae1b-002590263bf5.html
  Security:	https://vuxml.FreeBSD.org/freebsd/58685e23-ba4d-11e6-ae1b-002590263bf5.html
  Security:	https://vuxml.FreeBSD.org/freebsd/59f79c99-ba4d-11e6-ae1b-002590263bf5.html

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Sun Dec  4 18:41:05 2016	(r427794)
+++ head/security/vuxml/vuln.xml	Sun Dec  4 19:35:14 2016	(r427795)
@@ -58,6 +58,444 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="59f79c99-ba4d-11e6-ae1b-002590263bf5">
+    <topic>xen-tools -- delimiter injection vulnerabilities in pygrub</topic>
+    <affects>
+      <package>
+	<name>xen-tools</name>
+	<range><lt>4.7.1</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>The Xen Project reports:</p>
+	<blockquote cite="https://xenbits.xen.org/xsa/advisory-198.html">;
+	  <p>pygrub, the boot loader emulator, fails to quote (or sanity check)
+	    its results when reporting them to its caller.</p>
+	  <p>A malicious guest administrator can obtain the contents of
+	    sensitive host files (an information leak). Additionally, a
+	    malicious guest administrator can cause files on the host to be
+	    removed, causing a denial of service. In some unusual host
+	    configurations, ability to remove certain files may be useable for
+	    privilege escalation.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2016-9379</cvename>
+      <cvename>CVE-2016-9380</cvename>
+      <freebsdpr>ports/214936</freebsdpr>
+      <url>https://xenbits.xen.org/xsa/advisory-198.html</url>;
+    </references>
+    <dates>
+      <discovery>2016-11-22</discovery>
+      <entry>2016-12-04</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="58685e23-ba4d-11e6-ae1b-002590263bf5">
+    <topic>xen-tools -- qemu incautious about shared ring processing</topic>
+    <affects>
+      <package>
+	<name>xen-tools</name>
+	<range><lt>4.7.1</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>The Xen Project reports:</p>
+	<blockquote cite="https://xenbits.xen.org/xsa/advisory-197.html">;
+	  <p>The compiler can emit optimizations in qemu which can lead to
+	    double fetch vulnerabilities. Specifically data on the rings shared
+	    between qemu and the hypervisor (which the guest under control can
+	    obtain mappings of) can be fetched twice (during which time the
+	    guest can alter the contents) possibly leading to arbitrary code
+	    execution in qemu.</p>
+	  <p>Malicious administrators can exploit this vulnerability to take
+	    over the qemu process, elevating its privilege to that of the qemu
+	    process.</p>
+	  <p>In a system not using a device model stub domain (or other
+	    techniques for deprivileging qemu), malicious guest administrators
+	    can thus elevate their privilege to that of the host.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2016-9381</cvename>
+      <freebsdpr>ports/214936</freebsdpr>
+      <url>https://xenbits.xen.org/xsa/advisory-197.html</url>;
+    </references>
+    <dates>
+      <discovery>2016-11-22</discovery>
+      <entry>2016-12-04</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="56f0f11e-ba4d-11e6-ae1b-002590263bf5">
+    <topic>xen-kernel -- x86 64-bit bit test instruction emulation broken</topic>
+    <affects>
+      <package>
+	<name>xen-kernel</name>
+	<range><lt>4.7.1</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>The Xen Project reports:</p>
+	<blockquote cite="https://xenbits.xen.org/xsa/advisory-195.html">;
+	  <p>The x86 instructions BT, BTC, BTR, and BTS, when used with a
+	    destination memory operand and a source register rather than an
+	    immediate operand, access a memory location offset from that
+	    specified by the memory operand as specified by the high bits of
+	    the register source.</p>
+	  <p>A malicious guest can modify arbitrary memory, allowing for
+	    arbitrary code execution (and therefore privilege escalation
+	    affecting the whole host), a crash of the host (leading to a DoS),
+	    or information leaks. The vulnerability is sometimes exploitable
+	    by unprivileged guest user processes.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2016-9383</cvename>
+      <freebsdpr>ports/214936</freebsdpr>
+      <url>https://xenbits.xen.org/xsa/advisory-195.html</url>;
+    </references>
+    <dates>
+      <discovery>2016-11-22</discovery>
+      <entry>2016-12-04</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="5555120d-ba4d-11e6-ae1b-002590263bf5">
+    <topic>xen-kernel -- guest 32-bit ELF symbol table load leaking host data</topic>
+    <affects>
+      <package>
+	<name>xen-kernel</name>
+	<range><ge>4.7</ge><lt>4.7.1</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>The Xen Project reports:</p>
+	<blockquote cite="https://xenbits.xen.org/xsa/advisory-194.html">;
+	  <p>Along with their main kernel binary, unprivileged guests may
+	    arrange to have their Xen environment load (kernel) symbol tables
+	    for their use. The ELF image metadata created for this purpose has a
+	    few unused bytes when the symbol table binary is in 32-bit ELF
+	    format. These unused bytes were not properly cleared during symbol
+	    table loading.</p>
+	  <p>A malicious unprivileged guest may be able to obtain sensitive
+	    information from the host.</p>
+	  <p>The information leak is small and not under the control of the
+	    guest, so effectively exploiting this vulnerability is probably
+	    difficult.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2016-9384</cvename>
+      <freebsdpr>ports/214936</freebsdpr>
+      <url>https://xenbits.xen.org/xsa/advisory-194.html</url>;
+    </references>
+    <dates>
+      <discovery>2016-11-22</discovery>
+      <entry>2016-12-04</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="53dbd096-ba4d-11e6-ae1b-002590263bf5">
+    <topic>xen-kernel -- x86 segment base write emulation lacking canonical address checks</topic>
+    <affects>
+      <package>
+	<name>xen-kernel</name>
+	<range><ge>4.4</ge><lt>4.7.1</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>The Xen Project reports:</p>
+	<blockquote cite="https://xenbits.xen.org/xsa/advisory-193.html">;
+	  <p>Both writes to the FS and GS register base MSRs as well as the
+	    WRFSBASE and WRGSBASE instructions require their input values to be
+	    canonical, or a #GP fault will be raised. When the use of those
+	    instructions by the hypervisor was enabled, the previous guard
+	    against #GP faults (having recovery code attached) was accidentally
+	    removed.</p>
+	  <p>A malicious guest administrator can crash the host, leading to a
+	    DoS.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2016-9385</cvename>
+      <freebsdpr>ports/214936</freebsdpr>
+      <url>https://xenbits.xen.org/xsa/advisory-193.html</url>;
+    </references>
+    <dates>
+      <discovery>2016-11-22</discovery>
+      <entry>2016-12-04</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="523bb0b7-ba4d-11e6-ae1b-002590263bf5">
+    <topic>xen-kernel -- x86 task switch to VM86 mode mis-handled</topic>
+    <affects>
+      <package>
+	<name>xen-kernel</name>
+	<range><lt>4.7.1</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>The Xen Project reports:</p>
+	<blockquote cite="https://xenbits.xen.org/xsa/advisory-192.html">;
+	  <p>LDTR, just like TR, is purely a protected mode facility. Hence even
+	    when switching to a VM86 mode task, LDTR loading needs to follow
+	    protected mode semantics. This was violated by the code.</p>
+	  <p>On SVM (AMD hardware): a malicious unprivileged guest process can
+	    escalate its privilege to that of the guest operating system.</p>
+	  <p>On both SVM and VMX (Intel hardware): a malicious unprivileged
+	    guest process can crash the guest.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2016-9382</cvename>
+      <freebsdpr>ports/214936</freebsdpr>
+      <url>https://xenbits.xen.org/xsa/advisory-192.html</url>;
+    </references>
+    <dates>
+      <discovery>2016-11-22</discovery>
+      <entry>2016-12-04</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="50ac2e96-ba4d-11e6-ae1b-002590263bf5">
+    <topic>xen-kernel -- x86 null segments not always treated as unusable</topic>
+    <affects>
+      <package>
+	<name>xen-kernel</name>
+	<range><lt>4.7.1</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>The Xen Project reports:</p>
+	<blockquote cite="https://xenbits.xen.org/xsa/advisory-191.html">;
+	  <p>The Xen x86 emulator erroneously failed to consider the unusability
+	    of segments when performing memory accesses.</p>
+	  <p> The intended behaviour is as follows: The user data segment (%ds,
+	    %es, %fs and %gs) selectors may be NULL in 32-bit to prevent access.
+	    In 64-bit, NULL has a special meaning for user segments, and there
+	    is no way of preventing access. However, in both 32-bit and 64-bit,
+	    a NULL LDT system segment is intended to prevent access.</p>
+	  <p>On Intel hardware, loading a NULL selector zeros the base as well
+	    as most attributes, but sets the limit field to its largest possible
+	    value. On AMD hardware, loading a NULL selector zeros the attributes,
+	    leaving the stale base and limit intact.</p>
+	  <p>Xen may erroneously permit the access using unexpected base/limit
+	    values.</p>
+	  <p>Ability to exploit this vulnerability on Intel is easy, but on AMD
+	    depends in a complicated way on how the guest kernel manages LDTs.
+	    </p>
+	  <p>An unprivileged guest user program may be able to elevate its
+	      privilege to that of the guest operating system.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2016-9386</cvename>
+      <freebsdpr>ports/214936</freebsdpr>
+      <url>https://xenbits.xen.org/xsa/advisory-191.html</url>;
+    </references>
+    <dates>
+      <discovery>2016-11-22</discovery>
+      <entry>2016-12-04</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="4d7cf654-ba4d-11e6-ae1b-002590263bf5">
+    <topic>xen-kernel -- CR0.TS and CR0.EM not always honored for x86 HVM guests</topic>
+    <affects>
+      <package>
+	<name>xen-kernel</name>
+	<range><lt>4.7.1</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>The Xen Project reports:</p>
+	<blockquote cite="https://xenbits.xen.org/xsa/advisory-190.html">;
+	  <p>Instructions touching FPU, MMX, or XMM registers are required to
+	    raise a Device Not Available Exception (#NM) when either CR0.EM or
+	    CR0.TS are set. (Their AVX or AVX-512 extensions would consider only
+	    CR0.TS.) While during normal operation this is ensured by the
+	    hardware, if a guest modifies instructions while the hypervisor is
+	    preparing to emulate them, the #NM delivery could be missed.</p>
+	  <p>Guest code in one task may thus (unintentionally or maliciously)
+	    read or modify register state belonging to another task in the same
+	    VM.</p>
+	  <p>A malicious unprivileged guest user may be able to obtain or
+	    corrupt sensitive information (including cryptographic material) in
+	    other programs in the same guest.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2016-7777</cvename>
+      <freebsdpr>ports/214936</freebsdpr>
+      <url>https://xenbits.xen.org/xsa/advisory-190.html</url>;
+    </references>
+    <dates>
+      <discovery>2016-10-04</discovery>
+      <entry>2016-12-04</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="4bf57137-ba4d-11e6-ae1b-002590263bf5">
+    <topic>xen-kernel -- use after free in FIFO event channel code</topic>
+    <affects>
+      <package>
+	<name>xen-kernel</name>
+	<range><ge>4.4</ge><lt>4.5</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>The Xen Project reports:</p>
+	<blockquote cite="https://xenbits.xen.org/xsa/advisory-188.html">;
+	  <p>When the EVTCHNOP_init_control operation is called with a bad guest
+	    frame number, it takes an error path which frees a control structure
+	    without also clearing the corresponding pointer. Certain subsequent
+	    operations (EVTCHNOP_expand_array or another EVTCHNOP_init_control),
+	    upon finding the non-NULL pointer, continue operation assuming it
+	    points to allocated memory.</p>
+	  <p>A malicious guest administrator can crash the host, leading to a
+	    DoS. Arbitrary code execution (and therefore privilege escalation),
+	    and information leaks, cannot be excluded.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2016-7154</cvename>
+      <freebsdpr>ports/214936</freebsdpr>
+      <url>https://xenbits.xen.org/xsa/advisory-188.html</url>;
+    </references>
+    <dates>
+      <discovery>2016-09-08</discovery>
+      <entry>2016-12-04</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="4aae54be-ba4d-11e6-ae1b-002590263bf5">
+    <topic>xen-kernel -- x86 HVM: Overflow of sh_ctxt-&gt;seg_reg[]</topic>
+    <affects>
+      <package>
+	<name>xen-kernel</name>
+	<range><lt>4.7.1</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>The Xen Project reports:</p>
+	<blockquote cite="https://xenbits.xen.org/xsa/advisory-187.html">;
+	  <p>x86 HVM guests running with shadow paging use a subset of the x86
+	    emulator to handle the guest writing to its own pagetables. There
+	    are situations a guest can provoke which result in exceeding the
+	    space allocated for internal state.</p>
+	  <p>A malicious HVM guest administrator can cause Xen to fail a bug
+	    check, causing a denial of service to the host.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2016-7094</cvename>
+      <freebsdpr>ports/214936</freebsdpr>
+      <url>https://xenbits.xen.org/xsa/advisory-187.html</url>;
+    </references>
+    <dates>
+      <discovery>2016-09-08</discovery>
+      <entry>2016-12-04</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="49211361-ba4d-11e6-ae1b-002590263bf5">
+    <topic>xen-kernel -- x86: Mishandling of instruction pointer truncation during emulation</topic>
+    <affects>
+      <package>
+	<name>xen-kernel</name>
+	<range><eq>4.5.3</eq></range>
+	<range><eq>4.6.3</eq></range>
+	<range><ge>4.7.0</ge><lt>4.7.1</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>The Xen Project reports:</p>
+	<blockquote cite="https://xenbits.xen.org/xsa/advisory-186.html">;
+	  <p>When emulating HVM instructions, Xen uses a small i-cache for
+	    fetches from guest memory. The code that handles cache misses does
+	    not check if the address from which it fetched lies within the cache
+	    before blindly writing to it. As such it is possible for the guest
+	    to overwrite hypervisor memory.</p>
+	  <p>It is currently believed that the only way to trigger this bug is
+	    to use the way that Xen currently incorrectly wraps CS:IP in 16 bit
+	    modes. The included patch prevents such wrapping.</p>
+	  <p>A malicious HVM guest administrator can escalate their privilege to
+	    that of the host.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2016-7093</cvename>
+      <freebsdpr>ports/214936</freebsdpr>
+      <url>https://xenbits.xen.org/xsa/advisory-186.html</url>;
+    </references>
+    <dates>
+      <discovery>2016-09-08</discovery>
+      <entry>2016-12-04</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="45ca25b5-ba4d-11e6-ae1b-002590263bf5">
+    <topic>xen-kernel -- x86: Disallow L3 recursive pagetable for 32-bit PV guests</topic>
+    <affects>
+      <package>
+	<name>xen-kernel</name>
+	<range><lt>4.7.1</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>The Xen Project reports:</p>
+	<blockquote cite="https://xenbits.xen.org/xsa/advisory-185.html">;
+	  <p>On real hardware, a 32-bit PAE guest must leave the USER and RW bit
+	    clear in L3 pagetable entries, but the pagetable walk behaves as if
+	    they were set. (The L3 entries are cached in processor registers,
+	    and don't actually form part of the pagewalk.)</p>
+	  <p>When running a 32-bit PV guest on a 64-bit Xen, Xen must always OR
+	    in the USER and RW bits for L3 updates for the guest to observe
+	    architectural behaviour. This is unsafe in combination with
+	    recursive pagetables.</p>
+	  <p>As there is no way to construct an L3 recursive pagetable in native
+	    32-bit PAE mode, disallow this option in 32-bit PV guests.</p>
+	  <p>A malicious 32-bit PV guest administrator can escalate their
+	    privilege to that of the host.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2016-7092</cvename>
+      <freebsdpr>ports/214936</freebsdpr>
+      <url>https://xenbits.xen.org/xsa/advisory-185.html</url>;
+    </references>
+    <dates>
+      <discovery>2016-09-08</discovery>
+      <entry>2016-12-04</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="7fff2b16-b0ee-11e6-86b8-589cfc054129">
     <topic>wireshark -- multiple vulnerabilities</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201612041935.uB4JZEbD065092>