A vulnerability has been reported to the FreeBSD developers in bhyve that allows a vmm guest to overflow a buffer potentially allowing code execution outside the context of the vm.
On SmartOS, the bhyve process runs in a non-privileged zone which limits the potential impact. Stack smashing support in the illumos kernel shiped with SmartOS may also mitigate exploitation.
Actions Taken by Us
This issue has been fixed in illumos#15822, and release-202300727 (platform stamp 20230804T193934Z) is now available which includes a fix for this issue.
Actions You Need to Take
The new platform image is now available in both the
channels. This platform should be installed and assigned to all SmartOS compute
nodes and reboots scheduled for the earliest convenience.
You can use the following commands to prepare the new platform image.
sdcadm platform install -C release 20230804T193934Z
sdcadm platform assign 20230804T193934Z $(sdc-server lookup system_type=SunOS)
Once each compute node is rebooted, it can no longer be affected by this issue.
SmartOS Stand-alone Users
Stand alone SmartOS servers should be rebooted to the appropriate image.
If you are using a bootable pool, you can install the updated image using
piadm install 20230804T193934Z
piadm activate 20230804T193934Z
If you are a MNX customer and have any further questions or concerns after reading the information provided above, please contact MNX Support.
If you are an Open Source SmartOS/Triton user, please direct any further questions to the SmartOS Community Mailing Lists and IRC.