Skip to main content


Xen Project 4.13.3

We are pleased to announce the release of Xen 4.13.3. This is available immediately from its git repository;a=shortlog;h=refs/heads/stable-4.13 (tag RELEASE-4.13.3) or from this download page

This release contains the following bug-fixes and improvements in the Xen Project hypervisor:

  • 57a60c1f27: update Xen version to 4.13.3 [Jan Beulich]
  • d705cba5ae: SUPPORT.MD: Clarify the support state for the Arm SMMUv{1, 2} drivers [Julien Grall]
  • 29e9ca2763: xen/vgic: Implement write to ISPENDR in vGICv{2, 3} [Julien Grall]
  • 284aed024f: xen/arm: vgic-v3: fix GICD_ISACTIVER range [Peng Fan]
  • 2fb361c36a: xen/arm: mm: Remove ; at the end of mm_printk() [Julien Grall]
  • a702c80ec1: xen/arm: call iomem_permit_access for passthrough devices [Stefano Stabellini]
  • 8505e8a10e: xen/arm: Add workaround for Cortex-A53 erratum #843419 [Luca Fancellu]
  • c552d976e1: xen/arm: Add workaround for Cortex-A55 erratum #1530923 [Bertrand Marquis]
  • 96fbc00d1d: xen/arm: Add Cortex-A73 erratum 858921 workaround [Penny Zheng]
  • 934bb4c87c: xen/arm: Document the erratum #853709 related to Cortex A72 [Michal Orzel]
  • 24567a631e: xen/arm: mm: Access a PT entry before the table is unmapped [Julien Grall]
  • b2c4b77bff: xen/arm: sched: Ensure the vCPU context is seen before vcpu_pause() returns [Julien Grall]
  • 53e83edb8d: Revert "x86/timer: Fix boot on Intel systems using ITSSPRC static PIT clock gating" [Jan Beulich]
  • 015e51a0bc: x86/amd: Initial support for Fam19h processors [Andrew Cooper]
  • f2e50a048a: tools/oxenstored: mkdir conflicts were sometimes missed [Edwin Török]
  • 00cf603e6a: tools/oxenstored: Reject invalid watch paths early [Edwin Török]
  • 0a9bf01eab: tools/oxenstored: Fix quota calculation for mkdir EEXIST [Edwin Török]
  • 7660e7949d: tools/oxenstored: Trim txhistory on xenbus reconnect [Edwin Török]
  • 9e2ee42fb9: tools/ocaml/libs/xb: Do not crash after xenbus is unmapped [Edwin Török]
  • f95c227c75: oxenstored: fix ABI breakage introduced in Xen 4.9.0 [Edwin Török]
  • 5c65f9d5fc: tools/libxc: misc: Mark const the parameter 'keys' of xc_send_debug_keys() [Julien Grall]
  • 23f3adaa37: tools/ocaml: libxb: Avoid to use String_val() when value is bytes [Julien Grall]
  • 1cd059ae93: tools/ocaml: Fix stubs build when OCaml has been compiled with -safe-string [Julien Grall]
  • 0e904b781f: tools/ocaml: libxb: Harden stub_header_of_string() [Julien Grall]
  • 4547f01640: libxl: Fix domain soft reset state handling [Anthony PERARD]
  • 520d3b804f: xen: fix for_each_cpu when NR_CPUS=1 [Dario Faggioli]
  • c2aaebbbc4: vtd: make sure QI/IR are disabled before initialisation [Igor Druzhinin]
  • d4ac369247: x86/shadow: suppress "fast fault path" optimization without reserved bits [Jan Beulich]
  • b127def256: crypto: adjust rijndaelEncrypt() prototype for gcc11 [Jan Beulich]
  • 24b181e4e4: x86/dmop: Properly fail for PV guests [Andrew Cooper]
  • 8384641f6b: xen/sched: Add missing memory barrier in vcpu_block() [Julien Grall]
  • a4c4fc0de3: x86/EFI: suppress GNU ld 2.36'es creation of base relocs [Jan Beulich]
  • 98e6482bd1: gnttab: bypass IOMMU (un)mapping when a domain is (un)mapping its own grant [Jan Beulich]
  • 638b578713: gnttab: never permit mapping transitive grants [Jan Beulich]
  • c41fdabe84: xen/iommu: Check if the IOMMU was initialized before tearing down [Julien Grall]
  • ac4955c74b: x86emul: fix SYSENTER/SYSCALL switching into 64-bit mode [Jan Beulich]
  • 2b0c46ebb2: x86/ucode/amd: Fix OoB read in cpu_request_microcode() [Andrew Cooper]
  • 61ddd50cce: x86/EFI: work around GNU ld 2.36 issue [Jan Beulich]
  • 9724e60e03: x86/efi: enable MS ABI attribute on clang [Roger Pau Monné]
  • 2c813771c5: x86/string: correct memmove()'s forwarding to memcpy() [Jan Beulich]
  • e9cb958823: x86/debug: fix page-overflow bug in dbg_rw_guest_mem [Tamas K Lengyel]
  • be2f8932e2: x86/HVM: re-order error path of hvm_domain_initialise() [Jan Beulich]
  • ab3770e98f: memory: bail from page scrubbing when CPU is no longer online [Jan Beulich]
  • c11bd12218: x86/timer: Fix boot on Intel systems using ITSSPRC static PIT clock gating [Andrew Cooper]
  • 6d5d73b77f: xen/include: compat/xlat.h may change with .config changes [Jan Beulich]
  • 8b4f699b65: x86/vioapic: check IRR before attempting to inject interrupt after EOI [Roger Pau Monné]
  • d7a1e06efd: xen/arm: fix gnttab_need_iommu_mapping [Stefano Stabellini]
  • ab995b6af9: xen/page_alloc: Only flush the page to RAM once we know they are scrubbed [Julien Grall]
  • e4161938b3: x86/dpci: do not remove pirqs from domain tree on unbind [Roger Pau Monné]
  • 1dd564515d: xen/memory: Fix compat XENMEM_acquire_resource for size requests [Andrew Cooper]
  • bbce51a8da: x86/ACPI: don't overwrite FADT [Jan Beulich]
  • 95b5283e83: x86/hypercall: fix gnttab hypercall args conditional build on pvshim [Roger Pau Monné]
  • dc36f72d2a: x86/dpci: EOI interrupt regardless of its masking status [Roger Pau Monné]
  • 0c78a9d383: x86/vPCI: tolerate (un)masking a disabled MSI-X entry [Jan Beulich]
  • 10c7c213be: evtchn/FIFO: add 2nd smp_rmb() to evtchn_fifo_word_from_port() [Jan Beulich]
  • bb534d6515: evtchn/FIFO: re-order and synchronize (with) map_control_block() [Jan Beulich]
  • 16d0dc0eda: x86: avoid calling {svm,vmx}_do_resume() [Jan Beulich]
  • 13afcdf6f4: x86: fold guest_idle_loop() into idle_loop() [Jan Beulich]
  • d39eb6fbb3: x86: replace reset_stack_and_jump_nolp() [Jan Beulich]
  • a2f7ae132d: tools/ocaml/xenstored: only Dom0 can change node owner [Edwin Török]
  • d6a55f1c67: tools/ocaml/xenstored: delete watch from trie too when resetting watches [Edwin Török]
  • c6196caf01: tools/xenstore: Preserve bad client until they are destroyed [Harsha Shamsundara Havanur]
  • 18c0abb8f7: tools/xenstore: drop watch event messages exceeding maximum size [Juergen Gross]
  • 782aa4bb53: tools/ocaml/xenstored: Fix path length validation [Edwin Török]
  • 6aea4d88cd: tools/ocaml/xenstored: clean up permissions for dead domains [Edwin Török]
  • 12a41a8072: tools/xenstore: revoke access rights for removed domains [Juergen Gross]
  • 4056c3e668: tools/ocaml/xenstored: add xenstored.conf flag to turn off watch permission checks [Edwin Török]
  • f4d84a2481: tools/ocaml/xenstored: avoid watch events for nodes without access [Edwin Török]
  • 65c187f935: tools/ocaml/xenstored: introduce permissions for special watches [Edwin Török]
  • 2df79ff3ec: tools/ocaml/xenstored: unify watch firing [Edwin Török]
  • b693968548: tools/ocaml/xenstored: check privilege for XS_IS_DOMAIN_INTRODUCED [Edwin Török]
  • 52a0a8f611: tools/ocaml/xenstored: ignore transaction id for [un]watch [Edwin Török]
  • 60e3727bca: tools/xenstore: avoid watch events for nodes without access [Juergen Gross]
  • 8cc0a86379: tools/xenstore: allow special watches for privileged callers only [Juergen Gross]
  • ef765f6ebc: tools/xenstore: introduce node_perms structure [Juergen Gross]
  • b8f23da652: tools/xenstore: fire watches only when removing a specific node [Juergen Gross]
  • ee416da072: tools/xenstore: rework node removal [Juergen Gross]
  • 1819c9dbe8: tools/xenstore: check privilege for XS_IS_DOMAIN_INTRODUCED [Juergen Gross]
  • 1ab192f4ea: tools/xenstore: simplify and rename check_event_node() [Juergen Gross]
  • 2007c635cb: tools/xenstore: fix node accounting after failed node creation [Juergen Gross]
  • 2948458a63: tools/xenstore: ignore transaction id for [un]watch [Juergen Gross]
  • 4959626e92: tools/xenstore: allow removing child of a node exceeding quota [Juergen Gross]
  • 2fa586cb82: tools/ocaml/xenstored: do permission checks on xenstore root [Edwin Török]
  • b5302273e2: x86/vioapic: fix usage of index in place of GSI in vioapic_write_redirent [Roger Pau Monné]
  • 74c5729bb3: xen/events: rework fifo queue locking [Juergen Gross]
  • a1d8a6c24b: x86/DMI: fix SMBIOS pointer range check [Jan Beulich]
  • d064b6581b: xen/events: access last_priority and last_vcpu_id together [Juergen Gross]
  • 4f30743fdf: x86/vpt: fix build with old gcc [Jan Beulich]
  • 72031bcf69: xen/evtchn: revert 52e1fc47abc3a0123 [Juergen Gross]
  • 7d6f52d47b: xen/evtchn: rework per event channel lock [Juergen Gross]
  • ec092152be: update Xen version to 4.13.3-pre [Jan Beulich]
  • 5e4914e60d: memory: fix off-by-one in XSA-346 change [Jan Beulich]
  • d4c0483c0b: x86/msr: Disallow guest access to the RAPL MSRs [Andrew Cooper]
  • 33483f81ed: x86/msr: fix handling of MSR_IA32_PERF_{STATUS/CTL} [Roger Pau Monné]
  • 6434a6348d: xen/arm: Always trap AMU system registers [Julien Grall]
  • 971a9d1466: kdd: fix build again [Wei Liu]
  • a92f93500e: kdd: stop using [0] arrays to access packet contents [Tim Deegan]
  • a5756aa639: tools/xenstore: mark variable in header as extern [Anthony PERARD]
  • 43edb26167: tools/libs/stat: use memcpy instead of strncpy in getBridge [Bertrand Marquis]
  • d204083a01: tool/libs/light: Fix libxenlight gcc warning [Bertrand Marquis]
  • e596bf77d8: tools/libxc: report malloc errors in writev_exact [Olaf Hering]
  • c64c15f8d4: tools/libs/stat: fix broken build [Juergen Gross]
  • 1892cb9224: tools/xenstore: Do not abort xenstore-ls if a node disappears while iterating [David Woodhouse]
  • 75c5799291: tools/xenpmd: Fix gcc10 snprintf warning [Bertrand Marquis]
  • b3b43ac44c: libxl: fix -Werror=stringop-truncation in libxl__prepare_sockaddr_un [Marek Marczykowski-Górecki]
  • c0dc42ac07: libxl: workaround gcc 10.2 maybe-uninitialized warning [Marek Marczykowski-Górecki]
  • 83115491d4: Desupport qemu trad except stub dm [Ian Jackson]

This release also contains changes to qemu-upstream, whose changelogs we do not list here as it contains many changes that are not directly releated to the Xen Project Hypervisor and thus this release. However, you can check;a=shortlog (between tags qemu-xen-4.13.2 and qemu-xen-4.13.3).

This release, which includes source code for qemu-traditional and qemu-upstream, contains the following security fixes.

XSA Xen qemu-traditional qemu-upstream
XSA-115 Applied N/A N/A
XSA-322 Applied N/A N/A
XSA-323 Applied N/A N/A
XSA-324 Applied N/A N/A
XSA-325 Applied N/A N/A
XSA-330 Applied N/A N/A
XSA-348 Applied N/A N/A
XSA-349 N/A (Linux only) N/A N/A
XSA-350 N/A (Linux only) N/A N/A
XSA-351 Applied N/A N/A
XSA-352 Applied N/A N/A
XSA-353 Applied N/A N/A
XSA-354 N/A (xenopsd only) N/A N/A
XSA-355 Applied N/A N/A
XSA-356 N/A (Version not vulnerable) N/A N/A
XSA-358 Applied N/A N/A
XSA-359 Applied N/A N/A
XSA-360 Applied N/A N/A
XSA-361 N/A (Linux only) N/A N/A
XSA-362 N/A (Linux only) N/A N/A
XSA-363 N/A (Version not vulnerable) N/A N/A
XSA-364 Applied N/A N/A
XSA-365 N/A (Linux only) N/A N/A
XSA-366 N/A (Version not vulnerable) N/A N/A
XSA-367 N/A (Linux only) N/A N/A
XSA-368 Applied N/A N/A
XSA-369 N/A (Linux only) N/A N/A

See for details related to Xen Project security advisories.

We recommend all users of the 4.13 stable series to update to this latest point release.