| Errata ID | 372 | 
|---|---|
| Date | 2015-09-23 | 
| Source package | xen-4.1 | 
| Fixed in version | 4.1.3-21.52.201509171449 | 
| Description | The following security vulnerabilities have been fixed in xen-4.1:
* x86/mm: Fix loop increment in paging_log_dirty_range() (CVE-2012-5511)
  fix was incomplete
* tools: xenstored: if the reply is too big then send E2BIG error
  (CVE-2013-4416)
* x86/HVM: only allow ring 0 guest code to make hypercalls (CVE-2013-4554)
* x86/AMD: work around erratum 793 (CVE-2013-6885)
* VMX: fix cr0.cd handling (CVE-2013-2212)
* PHYSDEVOP_{prepare,release}_msix exposed to unprivileged guests
  (CVE-2014-1666)
* Denial of service against host by malicious HVM guest with assigned PCI
  device with pass-through (Long latency MMIO mapping operations are not
  preemptible) (CVE-2015-2752)
* HVM qemu unexpectedly enabling emulated VGA graphics backends
  (CVE-2015-2152)
* Information leak through XEN_DOMCTL_gettscinfo (CVE-2015-3340)
* Denial of service (host interrupt handling confusion) due to potential
  unintended writes to host MSI message data field via qemu by untrusted
  guest administrators (CVE-2015-4103)
* Denial of service (unexpected interrupt and host crash) due to PCI MSI mask
  bits inadvertently exposed to guests (CVE-2015-4104)
* Denial of service due to guest triggerable qemu MSI-X pass-through error
  messages filling up the host storage (CVE-2015-4105)
* Unmediated PCI command register access in qemu (CVE-2015-2756)
* Unmediated PCI register access in qemu possibly allows privilege
  escalation, host crash (Denial of Service), and leaked information
  (CVE-2015-4106)
* A privileged guest user in a guest with an AMD PCNet ethernet card enabled
  can potentially use this flaw to execute arbitrary code on the host with
  the privileges of the hosting QEMU process (CVE-2015-3209)
* The compat_iret function in Xen 3.1 through 4.5 iterates the wrong way
  through a loop, which allows local 32-bit PV guest administrators to
  cause a denial of service (large loop and system hang) via a hypercall_iret
  call with EFLAGS.VM set (CVE-2015-4164)
* xl command line config handling stack overflow (CVE-2015-3259)
* QEMU heap overflow flaw while processing certain ATAPI commands
  (CVE-2015-5154)
* QEMU leak of uninitialized heap memory in rtl8139 device model
  (CVE-2015-5165)
In addition the use of va_end() after va_copy() has been fixed. | 
				
| Additional notes | |
| CVE ID | CVE-2012-5511 CVE-2013-4416 CVE-2013-4554 CVE-2013-6885 CVE-2013-2212 CVE-2014-1666 CVE-2015-2752 CVE-2015-2152 CVE-2015-3340 CVE-2015-4103 CVE-2015-4104 CVE-2015-4105 CVE-2015-2756 CVE-2015-4106 CVE-2015-3209 CVE-2015-4164 CVE-2015-3259 CVE-2015-5154 CVE-2015-5165  | 
  
| UCS Bug number | #35104 #38565  | 
  
