Bug#775888: virtualbox: CVE-2014-6588 CVE-2014-6589 CVE-2014-6590 CVE-2014-6595 CVE-2015-0418 CVE-2015-0427

2015-01-27 Thread Gianfranco Costamagna
Hi Aron,
can you please also followup on squeeze-bpo?
(might need a kbuild backport to make it build)

cheers,

(thanks)

G.





Il Martedì 27 Gennaio 2015 13:57, Aron Xu happyaron...@gmail.com ha scritto:
I'll follow-up in wheezy-backports this weekend, at that time it
should land in jessie already.

Best,
Aron


On Tue, Jan 27, 2015 at 6:21 PM, Moritz Mühlenhoff j...@inutil.org wrote:
 On Mon, Jan 26, 2015 at 09:14:55PM +0530, Ritesh Raj Sarraf wrote:
 On 01/26/2015 09:07 PM, Ritesh Raj Sarraf wrote:
  On 01/21/2015 01:23 PM, Moritz Muehlenhoff wrote:
  In the past someone from upstream posted the upstream commits to the
  bug log, maybe you can contact them for more information so that we
  can merge the isolated fixes into the jessie version? Cheers, Moritz
 
  Moritz,
 
  For unstable, I've pushed the upload an d asked for an exception.
 
  For Wheezy, it is building right now. Once the build is complete, I'll
  push it to s-p-u. And send you the debdiff.

 Please find attached the debdiff. Please give me an ACK, and then I'll
 do the upload.

 Looks good to me. Please upload to security-master, I'll take care of
 the update.

 Cheers,
 Moritz




-- 
Regards,
Aron Xu


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#775888: virtualbox: CVE-2014-6588 CVE-2014-6589 CVE-2014-6590 CVE-2014-6595 CVE-2015-0418 CVE-2015-0427

2015-01-27 Thread Ritesh Raj Sarraf
On 01/27/2015 03:51 PM, Moritz Mühlenhoff wrote:
 Please find attached the debdiff. Please give me an ACK, and then I'll
  do the upload.
 Looks good to me. Please upload to security-master, I'll take care of
 the update.

Thanks Moritz. The upload is done.

-- 
Ritesh Raj Sarraf | http://people.debian.org/~rrs
Debian - The Universal Operating System



signature.asc
Description: OpenPGP digital signature


Bug#775888: virtualbox: CVE-2014-6588 CVE-2014-6589 CVE-2014-6590 CVE-2014-6595 CVE-2015-0418 CVE-2015-0427

2015-01-27 Thread Aron Xu
I'll check, if that's not too complicated I'll do it.

Cheers,
Aron


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#775888: virtualbox: CVE-2014-6588 CVE-2014-6589 CVE-2014-6590 CVE-2014-6595 CVE-2015-0418 CVE-2015-0427

2015-01-27 Thread Ritesh Raj Sarraf
On 01/26/2015 10:51 PM, Moritz Mühlenhoff wrote:
 Moritz,
  
  For unstable, I've pushed the upload an d asked for an exception.
 I've added the VMSVGA fixes to the security tracker, but there are also
 two issues in Core, which apply to wheezy/jessie:

 Could you please check back with upstream on CVE-2015-0377 and CVE-2015-0418?

 http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html

Frank from Oracle had mentioned that those 2 CVEs do not affect 4.3.x.
(Please see attached email).

For Wheezy, those CVE patches are included.


TO quote Frank and Gianfranco's conversation:
 CVE-2015-0418: VBox 4.3.x is not affected (only 4.2.x and older)
 CVE-2015-0377: VBox 4.3.x is not affected (only 4.2.x and older)
 do you have any patch for = 4.2.x then?

Attached.



-- 
Ritesh Raj Sarraf | http://people.debian.org/~rrs
Debian - The Universal Operating System

---BeginMessage---
Hi Gianfranco,

On Wednesday 21 January 2015 14:28:53 Gianfranco Costamagna wrote:
 the most CVEs from that CPU are related to the experimental VMSVGA
 implementation. This code is not documented and not announced and
 regular users will not use it. Therefore I suggest you to just disable
 that code by setting
 
   VBOX_WITH_VMSVGA=
   VBOX_WITH_VMSVGA3D=
 
 This will automatically omit CVE-2014-6595, CVE-2014-6590, CVE-2014-6589,
 CVE-2014-6588 and CVE-2015-0427. The actual patch to fix this code is a bit
 lengthy, therefore disabling this code is IMO the best solution.
 
 I presume starting from version 4.0 everything needs to be patched by
 disabling it?

that code does only exist in VBox 4.3.x, older branches are not affected.

 CVE-2015-0418: VBox 4.3.x is not affected (only 4.2.x and older)
 CVE-2015-0377: VBox 4.3.x is not affected (only 4.2.x and older)
 
 do you have any patch for = 4.2.x then?

Attached.

 4.0.10 4.1.12 4.1.18 4.3.10 4.3.14 4.3.18

These patches are against the latest code in the respective branches but
I hope they apply to these old versions. Sorry but it's not possible to
support such old versions, we only support the latest versions of a
specific branch.

 4.3.20 (not affected at all I presume)

Correct, already contains fixes for all these problems.

Frank
-- 
Dr.-Ing. Frank Mehnert | Software Development Director, VirtualBox
ORACLE Deutschland B.V.  Co. KG | Werkstr. 24 | 71384 Weinstadt, Germany

Hauptverwaltung: Riesstr. 25, D-80992 München
Registergericht: Amtsgericht München, HRA 95603
Geschäftsführer: Jürgen Kunz

Komplementärin: ORACLE Deutschland Verwaltung B.V.
Hertogswetering 163/167, 3543 AS Utrecht, Niederlande
Handelsregister der Handelskammer Midden-Niederlande, Nr. 30143697
Geschäftsführer: Alexander van der Ven, Astrid Kepper, Val MaherIndex: src/VBox/VMM/VMMAll/IOMAllMMIO.cpp
===
--- src/VBox/VMM/VMMAll/IOMAllMMIO.cpp	(revision 95342)
+++ src/VBox/VMM/VMMAll/IOMAllMMIO.cpp	(revision 95343)
@@ -1290,7 +1290,13 @@
 if (rc2 == VERR_SEM_BUSY)
 return (uErrorCode  X86_TRAP_PF_RW) ? VINF_IOM_HC_MMIO_WRITE : VINF_IOM_HC_MMIO_READ;
 #endif
-VBOXSTRICTRC rcStrict = iomMMIOHandler(pVM, uErrorCode, pCtxCore, GCPhysFault, iomMMIOGetRange(pVM-iom.s, GCPhysFault));
+PIOMMMIORANGE pRange = iomMMIOGetRange(pVM-iom.s, GCPhysFault);
+if (RT_UNLIKELY(!pRange))
+{
+iomUnlock(pVM);
+return VERR_IOM_MMIO_RANGE_NOT_FOUND;
+}
+VBOXSTRICTRC rcStrict = iomMMIOHandler(pVM, uErrorCode, pCtxCore, GCPhysFault, pRange);
 iomUnlock(pVM);
 return VBOXSTRICTRC_VAL(rcStrict);
 }
Index: include/VBox/hwacc_vmx.h
===
--- include/VBox/hwacc_vmx.h	(revision 96156)
+++ include/VBox/hwacc_vmx.h	(revision 96157)
@@ -519,6 +519,12 @@
 #define VMX_EXIT_WBINVD 54
 /** 55 XSETBV. Guest software attempted to execute XSETBV. */
 #define VMX_EXIT_XSETBV 55
+/** 57 RDRAND. Guest software attempted to execute RDRAND. */
+#define VMX_EXIT_RDRAND 57
+/** 58 INVPCID. Guest software attempted to execute INVPCID. */
+#define VMX_EXIT_INVPCID58
+/** 59 VMFUNC. Guest software attempted to execute VMFUNC. */
+#define VMX_EXIT_VMFUNC 59
 /** @} */
 
 
Index: src/VBox/VMM/VMMR0/HWVMXR0.cpp
===
--- src/VBox/VMM/VMMR0/HWVMXR0.cpp	(revision 96156)
+++ src/VBox/VMM/VMMR0/HWVMXR0.cpp	(revision 96157)
@@ -4036,6 +4036,10 @@
 case VMX_EXIT_VMWRITE:  /* 25 Guest software executed VMWRITE. */
 case VMX_EXIT_VMXOFF:   /* 26 Guest software executed VMXOFF. */
 case VMX_EXIT_VMXON:/* 27 Guest software executed VMXON. */
+case VMX_EXIT_INVEPT:   /* 50 Guest software executed INVEPT. */
+case VMX_EXIT_INVVPID:  /* 53 Guest software executed INVVPID. */
+case VMX_EXIT_INVPCID:  /* 58 Guest software executed INVPCID. */
+case 

Bug#775888: virtualbox: CVE-2014-6588 CVE-2014-6589 CVE-2014-6590 CVE-2014-6595 CVE-2015-0418 CVE-2015-0427

2015-01-27 Thread Gianfranco Costamagna
Hi Moritz, please read carefully this thread :)


Could you please check back with upstream on CVE-2015-0377 and CVE-2015-0418?

jessie is not affected, and wheezy has already the patch on this thread

the two CVEs are for VirtualBox prior to 3.2.26, 4.0.28, 4.1.36, 4.2.28

so 4.3 not affected.


Since jessie is already pending fixed, I propose to go for wheezy with the 
above one.
cheers,

G.


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#775888: virtualbox: CVE-2014-6588 CVE-2014-6589 CVE-2014-6590 CVE-2014-6595 CVE-2015-0418 CVE-2015-0427

2015-01-27 Thread Moritz Mühlenhoff
On Mon, Jan 26, 2015 at 09:14:55PM +0530, Ritesh Raj Sarraf wrote:
 On 01/26/2015 09:07 PM, Ritesh Raj Sarraf wrote:
  On 01/21/2015 01:23 PM, Moritz Muehlenhoff wrote:
  In the past someone from upstream posted the upstream commits to the
  bug log, maybe you can contact them for more information so that we
  can merge the isolated fixes into the jessie version? Cheers, Moritz 
 
  Moritz,
 
  For unstable, I've pushed the upload an d asked for an exception.
 
  For Wheezy, it is building right now. Once the build is complete, I'll
  push it to s-p-u. And send you the debdiff.
 
 Please find attached the debdiff. Please give me an ACK, and then I'll
 do the upload.

Looks good to me. Please upload to security-master, I'll take care of
the update.

Cheers,
Moritz


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#775888: virtualbox: CVE-2014-6588 CVE-2014-6589 CVE-2014-6590 CVE-2014-6595 CVE-2015-0418 CVE-2015-0427

2015-01-27 Thread Moritz Mühlenhoff
On Tue, Jan 27, 2015 at 09:53:45AM +, Gianfranco Costamagna wrote:
 Hi Moritz, please read carefully this thread :)
 
 
 Could you please check back with upstream on CVE-2015-0377 and CVE-2015-0418?
 
 jessie is not affected, and wheezy has already the patch on this thread
 
 the two CVEs are for VirtualBox prior to 3.2.26, 4.0.28, 4.1.36, 4.2.28
 
 so 4.3 not affected.
 
 
 Since jessie is already pending fixed, I propose to go for wheezy with the 
 above one.
 cheers,

Thanks, I've updated the security tracker.

Cheers,
Moritz


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#775888: virtualbox: CVE-2014-6588 CVE-2014-6589 CVE-2014-6590 CVE-2014-6595 CVE-2015-0418 CVE-2015-0427

2015-01-27 Thread Aron Xu
I'll follow-up in wheezy-backports this weekend, at that time it
should land in jessie already.

Best,
Aron

On Tue, Jan 27, 2015 at 6:21 PM, Moritz Mühlenhoff j...@inutil.org wrote:
 On Mon, Jan 26, 2015 at 09:14:55PM +0530, Ritesh Raj Sarraf wrote:
 On 01/26/2015 09:07 PM, Ritesh Raj Sarraf wrote:
  On 01/21/2015 01:23 PM, Moritz Muehlenhoff wrote:
  In the past someone from upstream posted the upstream commits to the
  bug log, maybe you can contact them for more information so that we
  can merge the isolated fixes into the jessie version? Cheers, Moritz
 
  Moritz,
 
  For unstable, I've pushed the upload an d asked for an exception.
 
  For Wheezy, it is building right now. Once the build is complete, I'll
  push it to s-p-u. And send you the debdiff.

 Please find attached the debdiff. Please give me an ACK, and then I'll
 do the upload.

 Looks good to me. Please upload to security-master, I'll take care of
 the update.

 Cheers,
 Moritz




-- 
Regards,
Aron Xu


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#775888: virtualbox: CVE-2014-6588 CVE-2014-6589 CVE-2014-6590 CVE-2014-6595 CVE-2015-0418 CVE-2015-0427

2015-01-26 Thread Ritesh Raj Sarraf
On 01/21/2015 01:23 PM, Moritz Muehlenhoff wrote:
 In the past someone from upstream posted the upstream commits to the
 bug log, maybe you can contact them for more information so that we
 can merge the isolated fixes into the jessie version? Cheers, Moritz 

Moritz,

For unstable, I've pushed the upload an d asked for an exception.

For Wheezy, it is building right now. Once the build is complete, I'll
push it to s-p-u. And send you the debdiff.



-- 
Ritesh Raj Sarraf
RESEARCHUT - http://www.researchut.com
Necessity is the mother of invention.



signature.asc
Description: OpenPGP digital signature


Bug#775888: virtualbox: CVE-2014-6588 CVE-2014-6589 CVE-2014-6590 CVE-2014-6595 CVE-2015-0418 CVE-2015-0427

2015-01-26 Thread Ritesh Raj Sarraf
On 01/26/2015 09:07 PM, Ritesh Raj Sarraf wrote:
 On 01/21/2015 01:23 PM, Moritz Muehlenhoff wrote:
 In the past someone from upstream posted the upstream commits to the
 bug log, maybe you can contact them for more information so that we
 can merge the isolated fixes into the jessie version? Cheers, Moritz 

 Moritz,

 For unstable, I've pushed the upload an d asked for an exception.

 For Wheezy, it is building right now. Once the build is complete, I'll
 push it to s-p-u. And send you the debdiff.

Please find attached the debdiff. Please give me an ACK, and then I'll
do the upload.

-- 
Ritesh Raj Sarraf | http://people.debian.org/~rrs
Debian - The Universal Operating System

diff -Nru virtualbox-4.1.18-dfsg/debian/changelog 
virtualbox-4.1.18-dfsg/debian/changelog
--- virtualbox-4.1.18-dfsg/debian/changelog 2014-04-14 14:54:39.0 
+0530
+++ virtualbox-4.1.18-dfsg/debian/changelog 2015-01-26 19:07:00.0 
+0530
@@ -1,3 +1,12 @@
+virtualbox (4.1.18-dfsg-2+deb7u4) wheezy-security; urgency=medium
+
+  [ Frank Mehnert ]
+  * fix security vulnerabilities (Closes: #775888)
+ CVE-2015-0377, CVE-2015-0418
+ - debian/patches/CVE-2015-0{377,418}.patch
+
+ -- Gianfranco Costamagna costamagnagianfra...@yahoo.it  Thu, 22 Jan 2015 
14:21:14 +0100
+
 virtualbox (4.1.18-dfsg-2+deb7u3) wheezy-security; urgency=high
 
   * Fix memory corruption vulnerabilities in 3D acceleration. (Closes: #741602)
diff -Nru virtualbox-4.1.18-dfsg/debian/patches/CVE-2015-0377.patch 
virtualbox-4.1.18-dfsg/debian/patches/CVE-2015-0377.patch
--- virtualbox-4.1.18-dfsg/debian/patches/CVE-2015-0377.patch   1970-01-01 
05:30:00.0 +0530
+++ virtualbox-4.1.18-dfsg/debian/patches/CVE-2015-0377.patch   2015-01-26 
19:07:00.0 +0530
@@ -0,0 +1,20 @@
+Index: src/VBox/VMM/VMMAll/IOMAllMMIO.cpp
+===
+--- a/src/VBox/VMM/VMMAll/IOMAllMMIO.cpp   (revision 95342)
 b/src/VBox/VMM/VMMAll/IOMAllMMIO.cpp   (revision 95343)
+@@ -1696,7 +1696,14 @@
+ if (rc2 == VERR_SEM_BUSY)
+ return VINF_IOM_HC_MMIO_READ_WRITE;
+ #endif
+-VBOXSTRICTRC rcStrict = iomMMIOHandler(pVM, (uint32_t)uErrorCode, 
pCtxCore, GCPhysFault, iomMmioGetRange(pVM, GCPhysFault));
++PIOMMMIORANGE pRange = iomMmioGetRange(pVM, GCPhysFault);
++if (RT_UNLIKELY(!pRange))
++{
++IOM_UNLOCK(pVM);
++return VERR_IOM_MMIO_RANGE_NOT_FOUND;
++}
++
++VBOXSTRICTRC rcStrict = iomMMIOHandler(pVM, (uint32_t)uErrorCode, 
pCtxCore, GCPhysFault, pRange);
+ IOM_UNLOCK(pVM);
+ return VBOXSTRICTRC_VAL(rcStrict);
+ }
diff -Nru virtualbox-4.1.18-dfsg/debian/patches/CVE-2015-0418.patch 
virtualbox-4.1.18-dfsg/debian/patches/CVE-2015-0418.patch
--- virtualbox-4.1.18-dfsg/debian/patches/CVE-2015-0418.patch   1970-01-01 
05:30:00.0 +0530
+++ virtualbox-4.1.18-dfsg/debian/patches/CVE-2015-0418.patch   2015-01-26 
19:07:00.0 +0530
@@ -0,0 +1,32 @@
+Index: include/VBox/vmm/hwacc_vmx.h
+===
+--- a/include/VBox/vmm/hwacc_vmx.h (revision 96156)
 b/include/VBox/vmm/hwacc_vmx.h (revision 96157)
+@@ -525,6 +525,12 @@
+ #define VMX_EXIT_WBINVD 54
+ /** 55 XSETBV. Guest software attempted to execute XSETBV. */
+ #define VMX_EXIT_XSETBV 55
++/** 57 RDRAND. Guest software attempted to execute RDRAND. */
++#define VMX_EXIT_RDRAND 57
++/** 58 INVPCID. Guest software attempted to execute INVPCID. */
++#define VMX_EXIT_INVPCID58
++/** 59 VMFUNC. Guest software attempted to execute VMFUNC. */
++#define VMX_EXIT_VMFUNC 59
+ /** @} */
+ 
+ 
+Index: src/VBox/VMM/VMMR0/HWVMXR0.cpp
+===
+--- a/src/VBox/VMM/VMMR0/HWVMXR0.cpp   (revision 96156)
 b/src/VBox/VMM/VMMR0/HWVMXR0.cpp   (revision 96157)
+@@ -4112,6 +4112,10 @@
+ case VMX_EXIT_VMWRITE:  /* 25 Guest software executed 
VMWRITE. */
+ case VMX_EXIT_VMXOFF:   /* 26 Guest software executed VMXOFF. 
*/
+ case VMX_EXIT_VMXON:/* 27 Guest software executed VMXON. 
*/
++case VMX_EXIT_INVEPT:   /* 50 Guest software executed INVEPT. 
*/
++case VMX_EXIT_INVVPID:  /* 53 Guest software executed 
INVVPID. */
++case VMX_EXIT_INVPCID:  /* 58 Guest software executed 
INVPCID. */
++case VMX_EXIT_VMFUNC:   /* 59 Guest software executed VMFUNC. 
*/
+ /** @todo inject #UD immediately */
+ rc = VERR_EM_INTERPRETER;
+ break;
diff -Nru virtualbox-4.1.18-dfsg/debian/patches/series 
virtualbox-4.1.18-dfsg/debian/patches/series
--- virtualbox-4.1.18-dfsg/debian/patches/series2014-04-14 
14:55:14.0 +0530
+++ virtualbox-4.1.18-dfsg/debian/patches/series2015-01-26 
19:07:00.0 +0530
@@ -20,3 +20,5 @@
 38-security-fixes-2014-01.patch
 CVE-2014-0981.patch
 

Bug#775888: virtualbox: CVE-2014-6588 CVE-2014-6589 CVE-2014-6590 CVE-2014-6595 CVE-2015-0418 CVE-2015-0427

2015-01-26 Thread Moritz Mühlenhoff
On Mon, Jan 26, 2015 at 09:07:19PM +0530, Ritesh Raj Sarraf wrote:
 On 01/21/2015 01:23 PM, Moritz Muehlenhoff wrote:
  In the past someone from upstream posted the upstream commits to the
  bug log, maybe you can contact them for more information so that we
  can merge the isolated fixes into the jessie version? Cheers, Moritz 
 
 Moritz,
 
 For unstable, I've pushed the upload an d asked for an exception.

I've added the VMSVGA fixes to the security tracker, but there are also
two issues in Core, which apply to wheezy/jessie:

Could you please check back with upstream on CVE-2015-0377 and CVE-2015-0418?

http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html

Cheers,
Moritz


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#775888: [vbox-dev] Fwd: Re: Bug#775888: virtualbox: CVE-2014-6588 CVE-2014-6589 CVE-2014-6590 CVE-2014-6595 CVE-2015-0418 CVE-2015-0427

2015-01-22 Thread Gianfranco Costamagna
Hi all,

so to sum everything up:

experimental: NOT AFFECTED.
jessie: fixed all of them by disabling the code (attached jessie-debdiff)

wheezy: fixed CVE-2015-0377, CVE-2015-0418

wheezy-bpo: I propose to backport the new 4.3.18 into bpo when it reaches 
testing.
squeeze: no virtualbox there

squeeze-bpo: I propose to backport kbuild and then virtualbox 4.1 or 4.3 from 
wheezy-jessie.

Attached the debdiffs



thanks again Frank for your help!

cheers,

Gianfranco

wheezy-debdiff
Description: Binary data


jessie-debdiff
Description: Binary data


Bug#775888: [vbox-dev] Fwd: Re: Bug#775888: virtualbox: CVE-2014-6588 CVE-2014-6589 CVE-2014-6590 CVE-2014-6595 CVE-2015-0418 CVE-2015-0427

2015-01-21 Thread Frank Mehnert
Hi,

On Wednesday 21 January 2015 18:55:40 Ritesh Raj Sarraf wrote:
 The recently declared CVEs for VBox have fixes mentioned only in the
 4.3.20 release.
 
 Debian Jessie is frozen, and for it, we have targeted the 4.3.18
 release. Do you have the broken out patches that fix the vulnerabilities ?

the most CVEs from that CPU are related to the experimental VMSVGA
implementation. This code is not documented and not announced and
regular users will not use it. Therefore I suggest you to just disable
that code by setting

  VBOX_WITH_VMSVGA=
  VBOX_WITH_VMSVGA3D=

This will automatically omit CVE-2014-6595, CVE-2014-6590, CVE-2014-6589,
CVE-2014-6588 and CVE-2015-0427. The actual patch to fix this code is a bit
lengthy, therefore disabling this code is IMO the best solution.

CVE-2015-0418: VBox 4.3.x is not affected (only 4.2.x and older)
CVE-2015-0377: VBox 4.3.x is not affected (only 4.2.x and older)
CVE-2014-0224: this is related to OpenSSL and therefore not a problem for
   Linux distributions as you compile your code against the
   distro-specific OpenSSL implementation.

Frank
-- 
Dr.-Ing. Frank Mehnert | Software Development Director, VirtualBox
ORACLE Deutschland B.V.  Co. KG | Werkstr. 24 | 71384 Weinstadt, Germany

Hauptverwaltung: Riesstr. 25, D-80992 München
Registergericht: Amtsgericht München, HRA 95603
Geschäftsführer: Jürgen Kunz

Komplementärin: ORACLE Deutschland Verwaltung B.V.
Hertogswetering 163/167, 3543 AS Utrecht, Niederlande
Handelsregister der Handelskammer Midden-Niederlande, Nr. 30143697
Geschäftsführer: Alexander van der Ven, Astrid Kepper, Val Maher


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#775888: Re: [vbox-dev] Fwd: Re: Bug#775888: virtualbox: CVE-2014-6588 CVE-2014-6589 CVE-2014-6590 CVE-2014-6595 CVE-2015-0418 CVE-2015-0427

2015-01-21 Thread Gianfranco Costamagna
Hi Frank,



that code does only exist in VBox 4.3.x, older branches are not affected.

wonderful
Attached.


wonderful
These patches are against the latest code in the respective branches but
I hope they apply to these old versions. Sorry but it's not possible to
support such old versions, we only support the latest versions of a
specific branch.

Of course, there is absolutely no problem in adapting them :)

Correct, already contains fixes for all these problems.
wonderful


have many thanks,

Gianfranco


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#775888: virtualbox: CVE-2014-6588 CVE-2014-6589 CVE-2014-6590 CVE-2014-6595 CVE-2015-0418 CVE-2015-0427

2015-01-21 Thread Moritz Muehlenhoff
On Wed, Jan 21, 2015 at 01:15:53PM +0530, Ritesh Raj Sarraf wrote:
 On 01/21/2015 12:53 PM, Moritz Muehlenhoff wrote:
  Package: virtualbox
  Severity: grave
  Tags: security
  Justification: user security hole
 
  No specific details available yet:
  http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
 
  Cheers,
  Moritz
 
 
 The following matrix is what I could grab.
 
 http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixOVIR
 
 CVE-2014-6595 Oracle VM VirtualBoxNoneVMSVGA device   No  
 3.2
 Local Low Single  NonePartial+Partial+
 VirtualBox prior to
 4.3.20See Note 3
 CVE-2014-6588 Oracle VM VirtualBoxNoneVMSVGA device   No  
 3.2
 Local Low Single  NonePartial+Partial+
 VirtualBox prior to
 4.3.20See Note 3
 CVE-2014-6589 Oracle VM VirtualBoxNoneVMSVGA device   No  
 3.2
 Local Low Single  NonePartial+Partial+
 VirtualBox prior to
 4.3.20See Note 3
 CVE-2014-6590 Oracle VM VirtualBoxNoneVMSVGA device   No  
 3.2
 Local Low Single  NonePartial+Partial+
 VirtualBox prior to
 4.3.20See Note 3
 CVE-2015-0427 Oracle VM VirtualBoxNoneVMSVGA device   No  
 3.2
 Local Low Single  NonePartial+Partial+
 VirtualBox prior to
 4.3.20See Note 3
 CVE-2015-0418 Oracle VM VirtualBoxNoneCoreNo  2.1 
 Local   Low
 None  NoneNonePartial+VirtualBox prior to 3.2.26, 4.0.28, 
 4.1.36,
 4.2.28 
 
 *Notes:*
 
  1. This fix also addresses CVE-2014-0231, CVE-2014-0118 and CVE-2014-5704.
  2. This fix also addresses CVE-2014-0221, CVE-2014-0195, CVE-2014-0198,
 CVE-2010-5298, CVE-2014-3470 and CVE-2014-0076.
  3. VMSVGA virtual graphics device is not documented and is disabled by
 default.
 
 @Moritz: There's nothing more detailed than the statement that all
 versions proior to 4.3.20 are vulnerable.
 4.3.20 is in experimental right now.

In the past someone from upstream posted the upstream commits to the
bug log, maybe you can contact them for more information so that
we can merge the isolated fixes into the jessie version?

Cheers,
Moritz


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#775888: virtualbox: CVE-2014-6588 CVE-2014-6589 CVE-2014-6590 CVE-2014-6595 CVE-2015-0418 CVE-2015-0427

2015-01-21 Thread Ritesh Raj Sarraf
Yes. We'll talk to the upstream folks.

s3nt fr0m a $martph0ne, excuse typ0s
On Jan 21, 2015 1:28 PM, Moritz Muehlenhoff j...@inutil.org wrote:

 On Wed, Jan 21, 2015 at 01:15:53PM +0530, Ritesh Raj Sarraf wrote:
  On 01/21/2015 12:53 PM, Moritz Muehlenhoff wrote:
   Package: virtualbox
   Severity: grave
   Tags: security
   Justification: user security hole
  
   No specific details available yet:
  
 http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
  
   Cheers,
   Moritz
  
 
  The following matrix is what I could grab.
 
 
 http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixOVIR
 
  CVE-2014-6595 Oracle VM VirtualBoxNoneVMSVGA device
  No  3.2
  Local Low Single  NonePartial+Partial+
 VirtualBox prior to
  4.3.20See Note 3
  CVE-2014-6588 Oracle VM VirtualBoxNoneVMSVGA device
  No  3.2
  Local Low Single  NonePartial+Partial+
 VirtualBox prior to
  4.3.20See Note 3
  CVE-2014-6589 Oracle VM VirtualBoxNoneVMSVGA device
  No  3.2
  Local Low Single  NonePartial+Partial+
 VirtualBox prior to
  4.3.20See Note 3
  CVE-2014-6590 Oracle VM VirtualBoxNoneVMSVGA device
  No  3.2
  Local Low Single  NonePartial+Partial+
 VirtualBox prior to
  4.3.20See Note 3
  CVE-2015-0427 Oracle VM VirtualBoxNoneVMSVGA device
  No  3.2
  Local Low Single  NonePartial+Partial+
 VirtualBox prior to
  4.3.20See Note 3
  CVE-2015-0418 Oracle VM VirtualBoxNoneCoreNo
 2.1 Local   Low
  None  NoneNonePartial+VirtualBox prior to 3.2.26,
 4.0.28, 4.1.36,
  4.2.28
 
  *Notes:*
 
   1. This fix also addresses CVE-2014-0231, CVE-2014-0118 and
 CVE-2014-5704.
   2. This fix also addresses CVE-2014-0221, CVE-2014-0195, CVE-2014-0198,
  CVE-2010-5298, CVE-2014-3470 and CVE-2014-0076.
   3. VMSVGA virtual graphics device is not documented and is disabled by
  default.
 
  @Moritz: There's nothing more detailed than the statement that all
  versions proior to 4.3.20 are vulnerable.
  4.3.20 is in experimental right now.

 In the past someone from upstream posted the upstream commits to the
 bug log, maybe you can contact them for more information so that
 we can merge the isolated fixes into the jessie version?

 Cheers,
 Moritz



Bug#775888: Re: [vbox-dev] Fwd: Re: Bug#775888: virtualbox: CVE-2014-6588 CVE-2014-6589 CVE-2014-6590 CVE-2014-6595 CVE-2015-0418 CVE-2015-0427

2015-01-21 Thread Frank Mehnert
Hi Gianfranco,

On Wednesday 21 January 2015 14:28:53 Gianfranco Costamagna wrote:
 the most CVEs from that CPU are related to the experimental VMSVGA
 implementation. This code is not documented and not announced and
 regular users will not use it. Therefore I suggest you to just disable
 that code by setting
 
   VBOX_WITH_VMSVGA=
   VBOX_WITH_VMSVGA3D=
 
 This will automatically omit CVE-2014-6595, CVE-2014-6590, CVE-2014-6589,
 CVE-2014-6588 and CVE-2015-0427. The actual patch to fix this code is a bit
 lengthy, therefore disabling this code is IMO the best solution.
 
 I presume starting from version 4.0 everything needs to be patched by
 disabling it?

that code does only exist in VBox 4.3.x, older branches are not affected.

 CVE-2015-0418: VBox 4.3.x is not affected (only 4.2.x and older)
 CVE-2015-0377: VBox 4.3.x is not affected (only 4.2.x and older)
 
 do you have any patch for = 4.2.x then?

Attached.

 4.0.10 4.1.12 4.1.18 4.3.10 4.3.14 4.3.18

These patches are against the latest code in the respective branches but
I hope they apply to these old versions. Sorry but it's not possible to
support such old versions, we only support the latest versions of a
specific branch.

 4.3.20 (not affected at all I presume)

Correct, already contains fixes for all these problems.

Frank
-- 
Dr.-Ing. Frank Mehnert | Software Development Director, VirtualBox
ORACLE Deutschland B.V.  Co. KG | Werkstr. 24 | 71384 Weinstadt, Germany

Hauptverwaltung: Riesstr. 25, D-80992 München
Registergericht: Amtsgericht München, HRA 95603
Geschäftsführer: Jürgen Kunz

Komplementärin: ORACLE Deutschland Verwaltung B.V.
Hertogswetering 163/167, 3543 AS Utrecht, Niederlande
Handelsregister der Handelskammer Midden-Niederlande, Nr. 30143697
Geschäftsführer: Alexander van der Ven, Astrid Kepper, Val MaherIndex: src/VBox/VMM/VMMAll/IOMAllMMIO.cpp
===
--- src/VBox/VMM/VMMAll/IOMAllMMIO.cpp	(revision 95342)
+++ src/VBox/VMM/VMMAll/IOMAllMMIO.cpp	(revision 95343)
@@ -1290,7 +1290,13 @@
 if (rc2 == VERR_SEM_BUSY)
 return (uErrorCode  X86_TRAP_PF_RW) ? VINF_IOM_HC_MMIO_WRITE : VINF_IOM_HC_MMIO_READ;
 #endif
-VBOXSTRICTRC rcStrict = iomMMIOHandler(pVM, uErrorCode, pCtxCore, GCPhysFault, iomMMIOGetRange(pVM-iom.s, GCPhysFault));
+PIOMMMIORANGE pRange = iomMMIOGetRange(pVM-iom.s, GCPhysFault);
+if (RT_UNLIKELY(!pRange))
+{
+iomUnlock(pVM);
+return VERR_IOM_MMIO_RANGE_NOT_FOUND;
+}
+VBOXSTRICTRC rcStrict = iomMMIOHandler(pVM, uErrorCode, pCtxCore, GCPhysFault, pRange);
 iomUnlock(pVM);
 return VBOXSTRICTRC_VAL(rcStrict);
 }
Index: include/VBox/hwacc_vmx.h
===
--- include/VBox/hwacc_vmx.h	(revision 96156)
+++ include/VBox/hwacc_vmx.h	(revision 96157)
@@ -519,6 +519,12 @@
 #define VMX_EXIT_WBINVD 54
 /** 55 XSETBV. Guest software attempted to execute XSETBV. */
 #define VMX_EXIT_XSETBV 55
+/** 57 RDRAND. Guest software attempted to execute RDRAND. */
+#define VMX_EXIT_RDRAND 57
+/** 58 INVPCID. Guest software attempted to execute INVPCID. */
+#define VMX_EXIT_INVPCID58
+/** 59 VMFUNC. Guest software attempted to execute VMFUNC. */
+#define VMX_EXIT_VMFUNC 59
 /** @} */
 
 
Index: src/VBox/VMM/VMMR0/HWVMXR0.cpp
===
--- src/VBox/VMM/VMMR0/HWVMXR0.cpp	(revision 96156)
+++ src/VBox/VMM/VMMR0/HWVMXR0.cpp	(revision 96157)
@@ -4036,6 +4036,10 @@
 case VMX_EXIT_VMWRITE:  /* 25 Guest software executed VMWRITE. */
 case VMX_EXIT_VMXOFF:   /* 26 Guest software executed VMXOFF. */
 case VMX_EXIT_VMXON:/* 27 Guest software executed VMXON. */
+case VMX_EXIT_INVEPT:   /* 50 Guest software executed INVEPT. */
+case VMX_EXIT_INVVPID:  /* 53 Guest software executed INVVPID. */
+case VMX_EXIT_INVPCID:  /* 58 Guest software executed INVPCID. */
+case VMX_EXIT_VMFUNC:   /* 59 Guest software executed VMFUNC. */
 /** @todo inject #UD immediately */
 rc = VERR_EM_INTERPRETER;
 break;
Index: src/VBox/VMM/VMMAll/IOMAllMMIO.cpp
===
--- src/VBox/VMM/VMMAll/IOMAllMMIO.cpp	(revision 95342)
+++ src/VBox/VMM/VMMAll/IOMAllMMIO.cpp	(revision 95343)
@@ -1305,7 +1305,13 @@
 if (rc2 == VERR_SEM_BUSY)
 return VINF_IOM_HC_MMIO_READ_WRITE;
 #endif
-VBOXSTRICTRC rcStrict = iomMMIOHandler(pVM, (uint32_t)uErrorCode, pCtxCore, GCPhysFault, iomMMIOGetRange(pVM-iom.s, GCPhysFault));
+PIOMMMIORANGE pRange = iomMMIOGetRange(pVM-iom.s, GCPhysFault);
+if (RT_UNLIKELY(!pRange))
+{
+iomUnlock(pVM);
+return VERR_IOM_MMIO_RANGE_NOT_FOUND;
+}
+VBOXSTRICTRC rcStrict = iomMMIOHandler(pVM, (uint32_t)uErrorCode, pCtxCore, GCPhysFault, 

Bug#775888: [vbox-dev] Fwd: Re: Bug#775888: virtualbox: CVE-2014-6588 CVE-2014-6589 CVE-2014-6590 CVE-2014-6595 CVE-2015-0418 CVE-2015-0427

2015-01-21 Thread Gianfranco Costamagna
Hi Frank




the most CVEs from that CPU are related to the experimental VMSVGA
implementation. This code is not documented and not announced and
regular users will not use it. Therefore I suggest you to just disable
that code by setting

  VBOX_WITH_VMSVGA=
  VBOX_WITH_VMSVGA3D=

This will automatically omit CVE-2014-6595, CVE-2014-6590, CVE-2014-6589,
CVE-2014-6588 and CVE-2015-0427. The actual patch to fix this code is a bit
lengthy, therefore disabling this code is IMO the best solution.


I presume starting from version 4.0 everything needs to be patched by disabling 
it?

CVE-2015-0418: VBox 4.3.x is not affected (only 4.2.x and older)
CVE-2015-0377: VBox 4.3.x is not affected (only 4.2.x and older)


do you have any patch for = 4.2.x then?

we have in the archive (debian and ubuntu)

4.0.10 4.1.12 4.1.18 4.3.10 4.3.14 4.3.18

4.3.20 (not affected at all I presume)

Frank-- 
Dr.-Ing. Frank Mehnert | Software Development Director, VirtualBox
ORACLE Deutschland B.V.  Co. KG | Werkstr. 24 | 71384 Weinstadt, Germany

Hauptverwaltung: Riesstr. 25, D-80992 München
Registergericht: Amtsgericht München, HRA 95603
Geschäftsführer: Jürgen Kunz

Komplementärin: ORACLE Deutschland Verwaltung B.V.
Hertogswetering 163/167, 3543 AS Utrecht, Niederlande
Handelsregister der Handelskammer Midden-Niederlande, Nr. 30143697
Geschäftsführer: Alexander van der Ven, Astrid Kepper, Val Maher


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#775888: virtualbox: CVE-2014-6588 CVE-2014-6589 CVE-2014-6590 CVE-2014-6595 CVE-2015-0418 CVE-2015-0427

2015-01-20 Thread Moritz Muehlenhoff
Package: virtualbox
Severity: grave
Tags: security
Justification: user security hole

No specific details available yet:
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html

Cheers,
Moritz


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#775888: virtualbox: CVE-2014-6588 CVE-2014-6589 CVE-2014-6590 CVE-2014-6595 CVE-2015-0418 CVE-2015-0427

2015-01-20 Thread Ritesh Raj Sarraf
On 01/21/2015 12:53 PM, Moritz Muehlenhoff wrote:
 Package: virtualbox
 Severity: grave
 Tags: security
 Justification: user security hole

 No specific details available yet:
 http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html

 Cheers,
 Moritz


The following matrix is what I could grab.

http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixOVIR

CVE-2014-6595   Oracle VM VirtualBoxNoneVMSVGA device   No  3.2
Local   Low Single  NonePartial+Partial+VirtualBox 
prior to
4.3.20  See Note 3
CVE-2014-6588   Oracle VM VirtualBoxNoneVMSVGA device   No  3.2
Local   Low Single  NonePartial+Partial+VirtualBox 
prior to
4.3.20  See Note 3
CVE-2014-6589   Oracle VM VirtualBoxNoneVMSVGA device   No  3.2
Local   Low Single  NonePartial+Partial+VirtualBox 
prior to
4.3.20  See Note 3
CVE-2014-6590   Oracle VM VirtualBoxNoneVMSVGA device   No  3.2
Local   Low Single  NonePartial+Partial+VirtualBox 
prior to
4.3.20  See Note 3
CVE-2015-0427   Oracle VM VirtualBoxNoneVMSVGA device   No  3.2
Local   Low Single  NonePartial+Partial+VirtualBox 
prior to
4.3.20  See Note 3
CVE-2015-0418   Oracle VM VirtualBoxNoneCoreNo  2.1 Local   
Low
NoneNoneNonePartial+VirtualBox prior to 3.2.26, 4.0.28, 
4.1.36,
4.2.28   

 

 

*Notes:*

 1. This fix also addresses CVE-2014-0231, CVE-2014-0118 and CVE-2014-5704.
 2. This fix also addresses CVE-2014-0221, CVE-2014-0195, CVE-2014-0198,
CVE-2010-5298, CVE-2014-3470 and CVE-2014-0076.
 3. VMSVGA virtual graphics device is not documented and is disabled by
default.



@Moritz: There's nothing more detailed than the statement that all
versions proior to 4.3.20 are vulnerable.
4.3.20 is in experimental right now.


-- 
Ritesh Raj Sarraf
RESEARCHUT - http://www.researchut.com
Necessity is the mother of invention.



signature.asc
Description: OpenPGP digital signature