I am pleased to announce the release of Xen 4.2.1 and Xen 4.1.4. These are available immediately from the following locations
- Xen 4.2.1: mercurial repository (tag RELEASE-4.2.1) or via the Xen 4.2.1 download page on xen.org.
- Xen 4.1.4: mercurial repository (tag RELEASE-4.1.4) or via the Xen 4.1.4 download page on xen.org.
Xen 4.2.1
The Xen 4.2.1 release fixes the following critical vulnerabilities: We recommend to all users of Xen 4.2.0 to upgrade to Xen 4.2.1.- CVE-2012-4535 / XSA-20: Timer overflow DoS vulnerability
- CVE-2012-4537 / XSA-22: Memory mapping failure DoS vulnerability
- CVE-2012-4538 / XSA-23: Unhooking empty PAE entries DoS vulnerability
- CVE-2012-4539 / XSA-24: Grant table hypercall infinite loop DoS vulnerability
- CVE-2012-4544, CVE-2012-2625 / XSA-25: Xen domain builder Out-of-memory due to malicious kernel/ramdisk
- CVE-2012-5510 / XSA-26: Grant table version switch list corruption vulnerability
- CVE-2012-5511 / XSA-27: Several HVM operations do not validate the range of their inputs
- CVE-2012-5513 / XSA-29: XENMEM_exchange may overwrite hypervisor memory
- CVE-2012-5514 / XSA-30: Broken error handling in guest_physmap_mark_populate_on_demand()
- CVE-2012-5515 / XSA-31: Several memory hypercall operations allow invalid extent order values
- CVE-2012-5525 / XSA-32: several hypercalls do not validate input GFNs
- A fix for a long standing time management issue
- Bug fixes for S3 (suspend to RAM) handling
- Bug fixes for other low level system state handling
- Bug fixes and improvements to the libxl tool stack
- Bug fixes to nested virtualization
Xen 4.1.4
The Xen 4.1.4 release contains fixes for the following critical vulnerabilities: We recommend to all users of the 4.0 and 4.1 stable series to upgrade to Xen 4.1.4.- CVE-2012-3494 / XSA-12: hypercall set_debugreg vulnerability
- CVE-2012-3495 / XSA-13: hypercall physdev_get_free_pirq vulnerability
- CVE-2012-3496 / XSA-14: XENMEM_populate_physmap DoS vulnerability
- CVE-2012-3498 / XSA-16: PHYSDEVOP_map_pirq index vulnerability
- CVE-2012-3515 / XSA-17: Qemu VT100 emulation vulnerability
- CVE-2012-4411 / XSA-19: guest administrator can access qemu monitor console
- CVE-2012-4535 / XSA-20: Timer overflow DoS vulnerability
- CVE-2012-4536 / XSA-21: pirq range check DoS vulnerability
- CVE-2012-4537 / XSA-22: Memory mapping failure DoS vulnerability
- CVE-2012-4538 / XSA-23: Unhooking empty PAE entries DoS vulnerability
- CVE-2012-4539 / XSA-24: Grant table hypercall infinite loop DoS vulnerability
- CVE-2012-4544,CVE-2012-2625 / XSA-25: Xen domain builder Out-of-memory due to malicious kernel/ramdisk
- CVE-2012-5510 / XSA-26: Grant table version switch list corruption vulnerability
- CVE-2012-5511 / XSA-27: several HVM operations do not validate the range of their inputs
- CVE-2012-5512 / XSA-28: HVMOP_get_mem_access crash / HVMOP_set_mem_access information leak
- CVE-2012-5513 / XSA-29: XENMEM_exchange may overwrite hypervisor memory
- CVE-2012-5514 / XSA-30: Broken error handling in guest_physmap_mark_populate_on_demand()
- CVE-2012-5515 / XSA-31: Several memory hypercall operations allow invalid extent order values
- A fix for a long standing time management issue
- Bug fixes for S3 (suspend to RAM) handling
- Bug fixes for other low level system state handling
No comments:
Post a Comment