Errata overview
Errata ID 372
Date 2015-09-23
Source package xen-4.1
Fixed in version 4.1.3-21.52.201509171449
Description
The following security vulnerabilities have been fixed in xen-4.1:
* x86/mm: Fix loop increment in paging_log_dirty_range() (CVE-2012-5511)
  fix was incomplete
* tools: xenstored: if the reply is too big then send E2BIG error
  (CVE-2013-4416)
* x86/HVM: only allow ring 0 guest code to make hypercalls (CVE-2013-4554)
* x86/AMD: work around erratum 793 (CVE-2013-6885)
* VMX: fix cr0.cd handling (CVE-2013-2212)
* PHYSDEVOP_{prepare,release}_msix exposed to unprivileged guests
  (CVE-2014-1666)
* Denial of service against host by malicious HVM guest with assigned PCI
  device with pass-through (Long latency MMIO mapping operations are not
  preemptible) (CVE-2015-2752)
* HVM qemu unexpectedly enabling emulated VGA graphics backends
  (CVE-2015-2152)
* Information leak through XEN_DOMCTL_gettscinfo (CVE-2015-3340)
* Denial of service (host interrupt handling confusion) due to potential
  unintended writes to host MSI message data field via qemu by untrusted
  guest administrators (CVE-2015-4103)
* Denial of service (unexpected interrupt and host crash) due to PCI MSI mask
  bits inadvertently exposed to guests (CVE-2015-4104)
* Denial of service due to guest triggerable qemu MSI-X pass-through error
  messages filling up the host storage (CVE-2015-4105)
* Unmediated PCI command register access in qemu (CVE-2015-2756)
* Unmediated PCI register access in qemu possibly allows privilege
  escalation, host crash (Denial of Service), and leaked information
  (CVE-2015-4106)
* A privileged guest user in a guest with an AMD PCNet ethernet card enabled
  can potentially use this flaw to execute arbitrary code on the host with
  the privileges of the hosting QEMU process (CVE-2015-3209)
* The compat_iret function in Xen 3.1 through 4.5 iterates the wrong way
  through a loop, which allows local 32-bit PV guest administrators to
  cause a denial of service (large loop and system hang) via a hypercall_iret
  call with EFLAGS.VM set (CVE-2015-4164)
* xl command line config handling stack overflow (CVE-2015-3259)
* QEMU heap overflow flaw while processing certain ATAPI commands
  (CVE-2015-5154)
* QEMU leak of uninitialized heap memory in rtl8139 device model
  (CVE-2015-5165)
In addition the use of va_end() after va_copy() has been fixed.
Additional notes
CVE ID CVE-2012-5511
CVE-2013-4416
CVE-2013-4554
CVE-2013-6885
CVE-2013-2212
CVE-2014-1666
CVE-2015-2752
CVE-2015-2152
CVE-2015-3340
CVE-2015-4103
CVE-2015-4104
CVE-2015-4105
CVE-2015-2756
CVE-2015-4106
CVE-2015-3209
CVE-2015-4164
CVE-2015-3259
CVE-2015-5154
CVE-2015-5165
UCS Bug number #35104
#38565