Notice: Undefined index: view in /mnt/data/vhosts/casite-484812.cloudaccess.net/httpdocs/components/com_docman/models/pages.php on line 124

Notice: Undefined index: view in /mnt/data/vhosts/casite-484812.cloudaccess.net/httpdocs/components/com_docman/models/pages.php on line 64

Notice: Undefined index: view in /mnt/data/vhosts/casite-484812.cloudaccess.net/httpdocs/components/com_docman/models/pages.php on line 84

Notice: Undefined index: view in /mnt/data/vhosts/casite-484812.cloudaccess.net/httpdocs/components/com_docman/models/pages.php on line 84

Notice: Undefined index: view in /mnt/data/vhosts/casite-484812.cloudaccess.net/httpdocs/components/com_docman/models/pages.php on line 84

Notice: Undefined index: view in /mnt/data/vhosts/casite-484812.cloudaccess.net/httpdocs/components/com_docman/models/pages.php on line 84

Notice: Undefined index: view in /mnt/data/vhosts/casite-484812.cloudaccess.net/httpdocs/components/com_docman/models/pages.php on line 84

Notice: Undefined index: view in /mnt/data/vhosts/casite-484812.cloudaccess.net/httpdocs/components/com_docman/models/pages.php on line 84

Notice: Undefined index: view in /mnt/data/vhosts/casite-484812.cloudaccess.net/httpdocs/components/com_docman/models/pages.php on line 84

Notice: Undefined index: view in /mnt/data/vhosts/casite-484812.cloudaccess.net/httpdocs/components/com_docman/models/pages.php on line 84

Notice: Undefined index: view in /mnt/data/vhosts/casite-484812.cloudaccess.net/httpdocs/components/com_docman/models/pages.php on line 84

Notice: Undefined index: view in /mnt/data/vhosts/casite-484812.cloudaccess.net/httpdocs/components/com_docman/models/pages.php on line 84

Notice: Undefined index: view in /mnt/data/vhosts/casite-484812.cloudaccess.net/httpdocs/components/com_docman/models/pages.php on line 84

Notice: Undefined index: view in /mnt/data/vhosts/casite-484812.cloudaccess.net/httpdocs/components/com_docman/models/pages.php on line 84

Notice: Undefined index: view in /mnt/data/vhosts/casite-484812.cloudaccess.net/httpdocs/components/com_docman/models/pages.php on line 84

Notice: Undefined index: view in /mnt/data/vhosts/casite-484812.cloudaccess.net/httpdocs/components/com_docman/models/pages.php on line 84

Notice: Undefined index: view in /mnt/data/vhosts/casite-484812.cloudaccess.net/httpdocs/components/com_docman/models/pages.php on line 84

Notice: Undefined index: view in /mnt/data/vhosts/casite-484812.cloudaccess.net/httpdocs/components/com_docman/models/pages.php on line 84

Notice: Undefined index: view in /mnt/data/vhosts/casite-484812.cloudaccess.net/httpdocs/components/com_docman/models/pages.php on line 84

Notice: Undefined index: view in /mnt/data/vhosts/casite-484812.cloudaccess.net/httpdocs/components/com_docman/models/pages.php on line 84

Notice: Undefined index: view in /mnt/data/vhosts/casite-484812.cloudaccess.net/httpdocs/components/com_docman/models/pages.php on line 84

Notice: Undefined index: view in /mnt/data/vhosts/casite-484812.cloudaccess.net/httpdocs/components/com_docman/models/pages.php on line 84

Supported Xen Project 4.3 series

Categories

Xen Project 4.3.0

Release Information

The Xen Project 4.3 release incorporates many new features and improvements to existing features.

Documentation

For Xen Project 4.3 documentation see

Contribution Acknowledgements

For a breakdown of contributions to Xen 4.3 check out the Xen 4.3 Acknowledgements.

Xen Project 4.3.1

Release Information

We are pleased to announce the release of Xen Project 4.3.1. This is available immediately from its git repository:

http://xenbits.xenproject.org/gitweb/?p=xen.git;a=shortlog;h=refs/heads/stable-4.3 (tag RELEASE-4.3.1)

This fixes the following critical vulnerabilities:

  • CVE-2013-1922 / XSA-48 qemu-nbd format-guessing due to missing format specification
  • CVE-2013-2007 / XSA-51 qemu guest agent (qga) insecure file permissions
  • CVE-2013-1442 / XSA-62 Information leak on AVX and/or LWP capable CPUs
  • CVE-2013-4355 / XSA-63 Information leaks through I/O instruction emulation
  • CVE-2013-4356 / XSA-64 Memory accessible by 64-bit PV guests under live migration
  • CVE-2013-4361 / XSA-66 Information leak through fbld instruction emulation
  • CVE-2013-4368 / XSA-67 Information leak through outs instruction emulation
  • CVE-2013-4369 / XSA-68 possible null dereference when parsing vif ratelimiting info
  • CVE-2013-4370 / XSA-69 misplaced free in ocaml xc_vcpu_getaffinity stub
  • CVE-2013-4371 / XSA-70 use-after-free in libxl_list_cpupool under memory pressure
  • CVE-2013-4375 / XSA-71 qemu disk backend (qdisk) resource leak
  • CVE-2013-4416 / XSA-72 ocaml xenstored mishandles oversized message replies

We recommend all users of the 4.2 stable series to update to this latest point release.

Among the bug fixes and improvements (around 80 since Xen Project 4.3.0):

  • Adjustments to XSAVE management
  • Bug fixes to nested virtualization
  • Bug fixes for other low level system state handling
  • Bug fixes to the libxl tool stack

Xen Project 4.3.2

We are pleased to announce the release of Xen Project 4.3.2. This is available immediately from its git repository

> http://xenbits.xen.org/gitweb/?p=xen.git;a=shortlog;h=refs/heads/stable-4.3 (tag RELEASE-4.3.2)

This fixes the following critical vulnerabilities:

  • CVE-2013-2212 / XSA-60 Excessive time to disable caching with HVM guests with PCI passthrough
  • CVE-2013-4494 / XSA-73 Lock order reversal between page allocation and grant table locks
  • CVE-2013-4553 / XSA-74 Lock order reversal between page_alloc_lock and mm_rwlock
  • CVE-2013-4551 / XSA-75 Host crash due to guest VMX instruction execution
  • CVE-2013-4554 / XSA-76 Hypercalls exposed to privilege rings 1 and 2 of HVM guests
  • CVE-2013-6375 / XSA-78 Insufficient TLB flushing in VT-d (iommu) code
  • CVE-2013-6400 / XSA-80 IOMMU TLB flushing may be inadvertently suppressed
  • CVE-2013-6885 / XSA-82 Guest triggerable AMD CPU erratum may cause host hang
  • CVE-2014-1642 / XSA-83 Out-of-memory condition yielding memory corruption during IRQ setup
  • CVE-2014-1891 / XSA-84 integer overflow in several XSM/Flask hypercalls
  • CVE-2014-1895 / XSA-85 Off-by-one error in FLASK_AVC_CACHESTAT hypercall
  • CVE-2014-1896 / XSA-86 libvchan failure handling malicious ring indexes
  • CVE-2014-1666 / XSA-87 PHYSDEVOP_{prepare,release}_msix exposed to unprivileged guests
  • CVE-2014-1950 / XSA-88 use-after-free in xc_cpupool_getinfo() under memory pressure

Apart from those there are many further bug fixes and improvements.

We recommend all users of the 4.3 stable series to update to the latest point release.

Xen Project 4.3.3

We are pleased to announce the release of Xen 4.3.3. This is available immediately from its git repository http://xenbits.xen.org/gitweb/?p=xen.git;a=shortlog;h=refs/heads/stable-4.3 (tag RELEASE-4.3.3)

 This release fixes the following critical vulnerabilities:

  • CVE-2014-2599 / XSA-89 HVMOP_set_mem_access is not preemptible
  • CVE-2014-3124 / XSA-92 HVMOP_set_mem_type allows invalid P2M entries to be created
  • CVE-2014-3967,CVE-2014-3968 / XSA-96 Vulnerabilities in HVM MSI injection
  • CVE-2014-4021 / XSA-100 Hypervisor heap contents leaked to guests Additionally a workaround for CVE-2013-3495 / XSA-59 (Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts) has been put in place. However, at this point we can't guarantee that all affected chipsets are being covered; Intel is working diligently on providing us with a complete list.

Apart from those fixes there are many further bug fixes and improvements. We recommend all users of the 4.3 stable series to update to this latest point release.