[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [ANNOUNCE] Xen 4.1.5 released

  • To: "xen-devel" <xen-devel@xxxxxxxxxxxxx>
  • From: "Jan Beulich" <JBeulich@xxxxxxxx>
  • Date: Thu, 25 Apr 2013 10:56:52 +0100
  • Delivery-date: Thu, 25 Apr 2013 09:56:28 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xen.org>


I am pleased to announce the release of Xen 4.1.5. This is
available immediately from its git repository:
(tag RELEASE-4.1.5) or from the XenProject download page

This fixes the following critical vulnerabilities:
 * CVE-2012-5634 / XSA-33:
    VT-d interrupt remapping source validation flaw
 * CVE-2013-0153 / XSA-36:
    interrupt remap entries shared and old ones not cleared on AMD IOMMUs
 * CVE-2013-0215 / XSA-38:
    oxenstored incorrect handling of certain Xenbus ring states
 * CVE-2013-0215 / XSA-38:
    oxenstored incorrect handling of certain Xenbus ring states
 * CVE-2012-6075 / XSA-41:
    qemu (e1000 device driver): Buffer overflow when processing large packets
 * CVE-2013-1917 / XSA-44:
    Xen PV DoS vulnerability with SYSENTER
 * CVE-2013-1919 / XSA-46:
    Several access permission issues with IRQs for unprivileged guests
 * CVE-2013-1920 / XSA-47:
    Potential use of freed memory in event channel operations
 * CVE-2013-1964 / XSA-50:
    grant table hypercall acquire/release imbalance

We recommend all users of the 4.1 stable series to update to this
latest point release.

Among many bug fixes and improvements (around 50 since Xen 4.1.4):
 * ACPI APEI/ERST finally working on production systems
 * Bug fixes for other low level system state handling
 * Support for xz compressed Dom0 and DomU kernels


Xen-devel mailing list



Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.