[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-announce] Xen 4.1.3 and 4.0.4 released

  • To: xen-announce@xxxxxxxxxxxxx
  • From: Lars Kurth <lars.kurth@xxxxxxx>
  • Date: Fri, 10 Aug 2012 16:04:05 +0100
  • Delivery-date: Fri, 10 Aug 2012 15:07:59 +0000
  • List-id: "Xen announcements \(low volume\)" <xen-announce.lists.xen.org>


Xen.org is pleased to announce the release of Xen 4.0.4 and 4.1.3. These are 
available immediately from the download pages
 * http://xen.org/download/index_4.1.3.html
 * http://xen.org/download/index_4.0.3.html
and their respective mercurial repositories:
 *http://xenbits.xen.org/xen-4.0-testing.hg  (tag RELEASE-4.0.4)
 *http://xenbits.xen.org/xen-4.1-testing.hg  (tag RELEASE-4.1.3)

These fix the following critical vulnerabilities:
 * CVE-2012-0217 / XSA-7: PV guest privilege escalation vulnerability
 * CVE-2012-0218 / XSA-8: guest denial of service on syscall/sysenter exception 
 * CVE-2012-2934 / XSA-9: PV guest host Denial of Service
 * CVE-2012-3432 / XSA-10: HVM guest user mode MMIO emulation DoS vulnerability
 * CVE-2012-3433 / XSA-11: HVM guest destroy p2m teardown host DoS vulnerability

We recommend all users of the 4.0 and 4.1 stable series to update to these 
latest point releases.

Among many bug fixes and improvements (over 100 since Xen 4.1.2):
 * Updates for the latest Intel/AMD CPU revisions
 * Bug fixes and improvements to the libxl tool stack
 * Bug fixes for IOMMU handling (device passthrough to HVM guests)
 * Bug fixes for host kexec/kdump

Best Regards,
Lars & Keir

Xen-announce mailing list



Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.