[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [ANNOUNCE] Xen 4.1.3 and 4.0.4 released

  • To: <xen-devel@xxxxxxxxxxxxxxxxxxx>
  • From: Keir Fraser <keir@xxxxxxx>
  • Date: Fri, 10 Aug 2012 14:11:18 +0100
  • Cc: Lars Kurth <lars.kurth@xxxxxxx>
  • Delivery-date: Fri, 10 Aug 2012 13:11:56 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xen.org>
  • Thread-index: Ac12+aDHpjS95s5Xkka8AHSLmpCSfQ==
  • Thread-topic: [ANNOUNCE] Xen 4.1.3 and 4.0.4 released


I am pleased to announce the release of Xen 4.0.4 and 4.1.3. These are
available immediately from their respective mercurial repositories:
http://xenbits.xen.org/xen-4.0-testing.hg (tag RELEASE-4.0.4)
http://xenbits.xen.org/xen-4.1-testing.hg (tag RELEASE-4.1.3)

These fix the following critical vulnerabilities:
 * CVE-2012-0217 / XSA-7:
    PV guest privilege escalation vulnerability
 * CVE-2012-0218 / XSA-8:
    guest denial of service on syscall/sysenter exception generation
 * CVE-2012-2934 / XSA-9:
    PV guest host Denial of Service
 * CVE-2012-3432 / XSA-10:
    HVM guest user mode MMIO emulation DoS vulnerability
 * CVE-2012-3433 / XSA-11:
    HVM guest destroy p2m teardown host DoS vulnerability

We recommend all users of the 4.0 and 4.1 stable series to update to these
latest point releases.

Among many bug fixes and improvements (over 100 since Xen 4.1.2):
 * Updates for the latest Intel/AMD CPU revisions
 * Bug fixes and improvements to the libxl tool stack
 * Bug fixes for IOMMU handling (device passthrough to HVM guests)
 * Bug fixes for host kexec/kdump


Xen-devel mailing list



Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.