Skip to main content

Downloads

Xen Project 4.13.3

We are pleased to announce the release of Xen 4.13.3. This is available immediately from its git repository

https://xenbits.xenproject.org/gitweb/?p=xen.git;a=shortlog;h=refs/heads/stable-4.13 (tag RELEASE-4.13.3) or from this download page

This release contains the following bug-fixes and improvements in the Xen Project hypervisor:

  • 57a60c1f27: update Xen version to 4.13.3 [Jan Beulich]
  • d705cba5ae: SUPPORT.MD: Clarify the support state for the Arm SMMUv{1, 2} drivers [Julien Grall]
  • 29e9ca2763: xen/vgic: Implement write to ISPENDR in vGICv{2, 3} [Julien Grall]
  • 284aed024f: xen/arm: vgic-v3: fix GICD_ISACTIVER range [Peng Fan]
  • 2fb361c36a: xen/arm: mm: Remove ; at the end of mm_printk() [Julien Grall]
  • a702c80ec1: xen/arm: call iomem_permit_access for passthrough devices [Stefano Stabellini]
  • 8505e8a10e: xen/arm: Add workaround for Cortex-A53 erratum #843419 [Luca Fancellu]
  • c552d976e1: xen/arm: Add workaround for Cortex-A55 erratum #1530923 [Bertrand Marquis]
  • 96fbc00d1d: xen/arm: Add Cortex-A73 erratum 858921 workaround [Penny Zheng]
  • 934bb4c87c: xen/arm: Document the erratum #853709 related to Cortex A72 [Michal Orzel]
  • 24567a631e: xen/arm: mm: Access a PT entry before the table is unmapped [Julien Grall]
  • b2c4b77bff: xen/arm: sched: Ensure the vCPU context is seen before vcpu_pause() returns [Julien Grall]
  • 53e83edb8d: Revert "x86/timer: Fix boot on Intel systems using ITSSPRC static PIT clock gating" [Jan Beulich]
  • 015e51a0bc: x86/amd: Initial support for Fam19h processors [Andrew Cooper]
  • f2e50a048a: tools/oxenstored: mkdir conflicts were sometimes missed [Edwin Török]
  • 00cf603e6a: tools/oxenstored: Reject invalid watch paths early [Edwin Török]
  • 0a9bf01eab: tools/oxenstored: Fix quota calculation for mkdir EEXIST [Edwin Török]
  • 7660e7949d: tools/oxenstored: Trim txhistory on xenbus reconnect [Edwin Török]
  • 9e2ee42fb9: tools/ocaml/libs/xb: Do not crash after xenbus is unmapped [Edwin Török]
  • f95c227c75: oxenstored: fix ABI breakage introduced in Xen 4.9.0 [Edwin Török]
  • 5c65f9d5fc: tools/libxc: misc: Mark const the parameter 'keys' of xc_send_debug_keys() [Julien Grall]
  • 23f3adaa37: tools/ocaml: libxb: Avoid to use String_val() when value is bytes [Julien Grall]
  • 1cd059ae93: tools/ocaml: Fix stubs build when OCaml has been compiled with -safe-string [Julien Grall]
  • 0e904b781f: tools/ocaml: libxb: Harden stub_header_of_string() [Julien Grall]
  • 4547f01640: libxl: Fix domain soft reset state handling [Anthony PERARD]
  • 520d3b804f: xen: fix for_each_cpu when NR_CPUS=1 [Dario Faggioli]
  • c2aaebbbc4: vtd: make sure QI/IR are disabled before initialisation [Igor Druzhinin]
  • d4ac369247: x86/shadow: suppress "fast fault path" optimization without reserved bits [Jan Beulich]
  • b127def256: crypto: adjust rijndaelEncrypt() prototype for gcc11 [Jan Beulich]
  • 24b181e4e4: x86/dmop: Properly fail for PV guests [Andrew Cooper]
  • 8384641f6b: xen/sched: Add missing memory barrier in vcpu_block() [Julien Grall]
  • a4c4fc0de3: x86/EFI: suppress GNU ld 2.36'es creation of base relocs [Jan Beulich]
  • 98e6482bd1: gnttab: bypass IOMMU (un)mapping when a domain is (un)mapping its own grant [Jan Beulich]
  • 638b578713: gnttab: never permit mapping transitive grants [Jan Beulich]
  • c41fdabe84: xen/iommu: Check if the IOMMU was initialized before tearing down [Julien Grall]
  • ac4955c74b: x86emul: fix SYSENTER/SYSCALL switching into 64-bit mode [Jan Beulich]
  • 2b0c46ebb2: x86/ucode/amd: Fix OoB read in cpu_request_microcode() [Andrew Cooper]
  • 61ddd50cce: x86/EFI: work around GNU ld 2.36 issue [Jan Beulich]
  • 9724e60e03: x86/efi: enable MS ABI attribute on clang [Roger Pau Monné]
  • 2c813771c5: x86/string: correct memmove()'s forwarding to memcpy() [Jan Beulich]
  • e9cb958823: x86/debug: fix page-overflow bug in dbg_rw_guest_mem [Tamas K Lengyel]
  • be2f8932e2: x86/HVM: re-order error path of hvm_domain_initialise() [Jan Beulich]
  • ab3770e98f: memory: bail from page scrubbing when CPU is no longer online [Jan Beulich]
  • c11bd12218: x86/timer: Fix boot on Intel systems using ITSSPRC static PIT clock gating [Andrew Cooper]
  • 6d5d73b77f: xen/include: compat/xlat.h may change with .config changes [Jan Beulich]
  • 8b4f699b65: x86/vioapic: check IRR before attempting to inject interrupt after EOI [Roger Pau Monné]
  • d7a1e06efd: xen/arm: fix gnttab_need_iommu_mapping [Stefano Stabellini]
  • ab995b6af9: xen/page_alloc: Only flush the page to RAM once we know they are scrubbed [Julien Grall]
  • e4161938b3: x86/dpci: do not remove pirqs from domain tree on unbind [Roger Pau Monné]
  • 1dd564515d: xen/memory: Fix compat XENMEM_acquire_resource for size requests [Andrew Cooper]
  • bbce51a8da: x86/ACPI: don't overwrite FADT [Jan Beulich]
  • 95b5283e83: x86/hypercall: fix gnttab hypercall args conditional build on pvshim [Roger Pau Monné]
  • dc36f72d2a: x86/dpci: EOI interrupt regardless of its masking status [Roger Pau Monné]
  • 0c78a9d383: x86/vPCI: tolerate (un)masking a disabled MSI-X entry [Jan Beulich]
  • 10c7c213be: evtchn/FIFO: add 2nd smp_rmb() to evtchn_fifo_word_from_port() [Jan Beulich]
  • bb534d6515: evtchn/FIFO: re-order and synchronize (with) map_control_block() [Jan Beulich]
  • 16d0dc0eda: x86: avoid calling {svm,vmx}_do_resume() [Jan Beulich]
  • 13afcdf6f4: x86: fold guest_idle_loop() into idle_loop() [Jan Beulich]
  • d39eb6fbb3: x86: replace reset_stack_and_jump_nolp() [Jan Beulich]
  • a2f7ae132d: tools/ocaml/xenstored: only Dom0 can change node owner [Edwin Török]
  • d6a55f1c67: tools/ocaml/xenstored: delete watch from trie too when resetting watches [Edwin Török]
  • c6196caf01: tools/xenstore: Preserve bad client until they are destroyed [Harsha Shamsundara Havanur]
  • 18c0abb8f7: tools/xenstore: drop watch event messages exceeding maximum size [Juergen Gross]
  • 782aa4bb53: tools/ocaml/xenstored: Fix path length validation [Edwin Török]
  • 6aea4d88cd: tools/ocaml/xenstored: clean up permissions for dead domains [Edwin Török]
  • 12a41a8072: tools/xenstore: revoke access rights for removed domains [Juergen Gross]
  • 4056c3e668: tools/ocaml/xenstored: add xenstored.conf flag to turn off watch permission checks [Edwin Török]
  • f4d84a2481: tools/ocaml/xenstored: avoid watch events for nodes without access [Edwin Török]
  • 65c187f935: tools/ocaml/xenstored: introduce permissions for special watches [Edwin Török]
  • 2df79ff3ec: tools/ocaml/xenstored: unify watch firing [Edwin Török]
  • b693968548: tools/ocaml/xenstored: check privilege for XS_IS_DOMAIN_INTRODUCED [Edwin Török]
  • 52a0a8f611: tools/ocaml/xenstored: ignore transaction id for [un]watch [Edwin Török]
  • 60e3727bca: tools/xenstore: avoid watch events for nodes without access [Juergen Gross]
  • 8cc0a86379: tools/xenstore: allow special watches for privileged callers only [Juergen Gross]
  • ef765f6ebc: tools/xenstore: introduce node_perms structure [Juergen Gross]
  • b8f23da652: tools/xenstore: fire watches only when removing a specific node [Juergen Gross]
  • ee416da072: tools/xenstore: rework node removal [Juergen Gross]
  • 1819c9dbe8: tools/xenstore: check privilege for XS_IS_DOMAIN_INTRODUCED [Juergen Gross]
  • 1ab192f4ea: tools/xenstore: simplify and rename check_event_node() [Juergen Gross]
  • 2007c635cb: tools/xenstore: fix node accounting after failed node creation [Juergen Gross]
  • 2948458a63: tools/xenstore: ignore transaction id for [un]watch [Juergen Gross]
  • 4959626e92: tools/xenstore: allow removing child of a node exceeding quota [Juergen Gross]
  • 2fa586cb82: tools/ocaml/xenstored: do permission checks on xenstore root [Edwin Török]
  • b5302273e2: x86/vioapic: fix usage of index in place of GSI in vioapic_write_redirent [Roger Pau Monné]
  • 74c5729bb3: xen/events: rework fifo queue locking [Juergen Gross]
  • a1d8a6c24b: x86/DMI: fix SMBIOS pointer range check [Jan Beulich]
  • d064b6581b: xen/events: access last_priority and last_vcpu_id together [Juergen Gross]
  • 4f30743fdf: x86/vpt: fix build with old gcc [Jan Beulich]
  • 72031bcf69: xen/evtchn: revert 52e1fc47abc3a0123 [Juergen Gross]
  • 7d6f52d47b: xen/evtchn: rework per event channel lock [Juergen Gross]
  • ec092152be: update Xen version to 4.13.3-pre [Jan Beulich]
  • 5e4914e60d: memory: fix off-by-one in XSA-346 change [Jan Beulich]
  • d4c0483c0b: x86/msr: Disallow guest access to the RAPL MSRs [Andrew Cooper]
  • 33483f81ed: x86/msr: fix handling of MSR_IA32_PERF_{STATUS/CTL} [Roger Pau Monné]
  • 6434a6348d: xen/arm: Always trap AMU system registers [Julien Grall]
  • 971a9d1466: kdd: fix build again [Wei Liu]
  • a92f93500e: kdd: stop using [0] arrays to access packet contents [Tim Deegan]
  • a5756aa639: tools/xenstore: mark variable in header as extern [Anthony PERARD]
  • 43edb26167: tools/libs/stat: use memcpy instead of strncpy in getBridge [Bertrand Marquis]
  • d204083a01: tool/libs/light: Fix libxenlight gcc warning [Bertrand Marquis]
  • e596bf77d8: tools/libxc: report malloc errors in writev_exact [Olaf Hering]
  • c64c15f8d4: tools/libs/stat: fix broken build [Juergen Gross]
  • 1892cb9224: tools/xenstore: Do not abort xenstore-ls if a node disappears while iterating [David Woodhouse]
  • 75c5799291: tools/xenpmd: Fix gcc10 snprintf warning [Bertrand Marquis]
  • b3b43ac44c: libxl: fix -Werror=stringop-truncation in libxl__prepare_sockaddr_un [Marek Marczykowski-Górecki]
  • c0dc42ac07: libxl: workaround gcc 10.2 maybe-uninitialized warning [Marek Marczykowski-Górecki]
  • 83115491d4: SUPPORT.md: Desupport qemu trad except stub dm [Ian Jackson]

This release also contains changes to qemu-upstream, whose changelogs we do not list here as it contains many changes that are not directly releated to the Xen Project Hypervisor and thus this release. However, you can check https://xenbits.xenproject.org/gitweb/?p=qemu-xen.git;a=shortlog (between tags qemu-xen-4.13.2 and qemu-xen-4.13.3).

This release, which includes source code for qemu-traditional and qemu-upstream, contains the following security fixes.

XSA Xen qemu-traditional qemu-upstream
XSA-115 Applied N/A N/A
XSA-322 Applied N/A N/A
XSA-323 Applied N/A N/A
XSA-324 Applied N/A N/A
XSA-325 Applied N/A N/A
XSA-330 Applied N/A N/A
XSA-348 Applied N/A N/A
XSA-349 N/A (Linux only) N/A N/A
XSA-350 N/A (Linux only) N/A N/A
XSA-351 Applied N/A N/A
XSA-352 Applied N/A N/A
XSA-353 Applied N/A N/A
XSA-354 N/A (xenopsd only) N/A N/A
XSA-355 Applied N/A N/A
XSA-356 N/A (Version not vulnerable) N/A N/A
XSA-358 Applied N/A N/A
XSA-359 Applied N/A N/A
XSA-360 Applied N/A N/A
XSA-361 N/A (Linux only) N/A N/A
XSA-362 N/A (Linux only) N/A N/A
XSA-363 N/A (Version not vulnerable) N/A N/A
XSA-364 Applied N/A N/A
XSA-365 N/A (Linux only) N/A N/A
XSA-366 N/A (Version not vulnerable) N/A N/A
XSA-367 N/A (Linux only) N/A N/A
XSA-368 Applied N/A N/A
XSA-369 N/A (Linux only) N/A N/A

See https://xenbits.xenproject.org/xsa/ for details related to Xen Project security advisories.

We recommend all users of the 4.13 stable series to update to this latest point release.