FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

FreeBSD -- bhyve(8) privileged guest escape via USB controller

Affected packages
14.1 <= FreeBSD < 14.1_4
14.0 <= FreeBSD < 14.0_10
13.3 <= FreeBSD < 13.3_6

Details

VuXML ID 4edaa9f4-6b51-11ef-9a62-002590c1f29c
Discovery 2024-09-04
Entry 2024-09-05

Problem Description:

bhyve can be configured to emulate devices on a virtual USB controller (XHCI), such as USB tablet devices. An insufficient boundary validation in the USB code could lead to an out-of-bounds write on the heap, with data controlled by the caller.

Impact:

A malicious, privileged software running in a guest VM can exploit the vulnerability to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process.

References

CVE Name CVE-2024-32668
FreeBSD Advisory SA-24:12.bhyve