Xen 4.1.4
Xen 4.1.4 is a maintenance release in the 4.1 series and contains:
Fixes for the following critical vulnerabilities: We recommend all users of the 4.0 and 4.1 stable series to update to Xen 4.1.4.
CVE-2012-3494 / XSA-12: hypercall set_debugreg vulnerability
CVE-2012-3495 / XSA-13: hypercall physdev_get_free_pirq vulnerability
CVE-2012-3496 / XSA-14: XENMEM_populate_physmap DoS vulnerability
CVE-2012-3498 / XSA-16: PHYSDEVOP_map_pirq index vulnerability
CVE-2012-3515 / XSA-17: Qemu VT100 emulation vulnerability
CVE-2012-4411 / XSA-19: guest administrator can access qemu monitor console
CVE-2012-4535 / XSA-20: Timer overflow DoS vulnerability
CVE-2012-4536 / XSA-21: pirq range check DoS vulnerability
CVE-2012-4537 / XSA-22: Memory mapping failure DoS vulnerability
CVE-2012-4538 / XSA-23: Unhooking empty PAE entries DoS vulnerability
CVE-2012-4539 / XSA-24: Grant table hypercall infinite loop DoS vulnerability
CVE-2012-4544,CVE-2012-2625 / XSA-25: Xen domain builder Out-of-memory due to malicious kernel/ramdisk
CVE-2012-5510 / XSA-26: Grant table version switch list corruption vulnerability
CVE-2012-5511 / XSA-27: several HVM operations do not validate the range of their inputs
CVE-2012-5512 / XSA-28: HVMOP_get_mem_access crash / HVMOP_set_mem_access information leak
CVE-2012-5513 / XSA-29: XENMEM_exchange may overwrite hypervisor memory
CVE-2012-5514 / XSA-30: Broken error handling in guest_physmap_mark_populate_on_demand()
CVE-2012-5515 / XSA-31: Several memory hypercall operations allow invalid extent order values
Among many bug fixes and improvements (almost 100 since Xen 4.1.3). Highlights are:
A fix for a long standing time management issue
Bug fixes for S3 (suspend to RAM) handling
Bug fixes for other low level system state handling
It also contains the following fixes from earlier maintenance releases:
Security fixes including CVE-2011-1583, CVE-2011-1898, CVE-2012-0217 / XSA-7, CVE-2012-0218 / XSA-8, CVE-2012-2934 / XSA-9, CVE-2012-3432 / XSA-10 and CVE-2012-3433 / XSA-11
Enhancements to guest introspection (VM single stepping support for very fine-grained access control)
Many bug fixes and improvements, such as:
Updates for the latest Intel/AMD CPU revisions
Bug fixes and improvements to the libxl tool stack
Bug fixes for IOMMU handling (device passthrough to HVM guests)
Bug fixes for host kexec/kdump
PV-on-HVM stability fixes (fixing some IRQ issues)
XSAVE cpu feature support for PV guests (allows safe use of latest multimedia instructions)
RAS fixes for high availability
fixes for offlining bad pages
changes to libxc, mainly of benefit to libvirt
New XL toolstack
Debug support: kexec/kdump
Remus (High Availability)
Device passthrough to HVM guests
Interrupt handling
Support for Supervisor Mode Execution Protection (SMEP)
Compatibility fixes for newer Linux guests, newer compilers, some old guest savefiles, newer Python, grub2, some hardware/BIOS bugs.
The Xen 4.1 release contains a number of important new features and updates including:
A re-architected XL toolstack that is functionally nearly equivalent to XM/XEND
Prototype credit2 scheduler designed for latency-sensitive workloads and very large systems
CPU Pools for advanced partitioning
Support for large systems (>255 processors and 1GB/2MB super page support)
Support for x86 Advanced Vector eXtension (AVX)
New Memory Access API enabling integration of 3rd party security solutions into Xen virtualized environments
Even better stability through our new automated regression tests
Xen 4.1 Release Notes
Xen 4.1 Datasheet
Xen 4.1.4
Xen 4.1.4 (hypervisor and tools) official source distribution