Xen Changelog

New in version 4.3.1

November 4th, 2013
  • This fixes the following critical vulnerabilities:
  • CVE-2013-1922 / XSA-48 qemu-nbd format-guessing due to missing format specification
  • CVE-2013-2007 / XSA-51 qemu guest agent (qga) insecure file permissions
  • CVE-2013-1442 / XSA-62 Information leak on AVX and/or LWP capable CPUs
  • CVE-2013-4355 / XSA-63 Information leaks through I/O instruction emulation
  • CVE-2013-4356 / XSA-64 Memory accessible by 64-bit PV guests under live migration
  • CVE-2013-4361 / XSA-66 Information leak through fbld instruction emulation
  • CVE-2013-4368 / XSA-67 Information leak through outs instruction emulation
  • CVE-2013-4369 / XSA-68 possible null dereference when parsing vif ratelimiting info
  • CVE-2013-4370 / XSA-69 misplaced free in ocaml xc_vcpu_getaffinity stub
  • CVE-2013-4371 / XSA-70 use-after-free in libxl_list_cpupool under memory pressure
  • CVE-2013-4375 / XSA-71 qemu disk backend (qdisk) resource leak
  • CVE-2013-4416 / XSA-72 ocaml xenstored mishandles oversized message replies
  • Among the bug fixes and improvements (around 80 since Xen 4.3.0):
  • Adjustments to XSAVE management
  • Bug fixes to nested virtualization
  • Bug fixes for other low level system state handling
  • Bug fixes to the libxl tool stack

New in version 4.3.0 (July 10th, 2013)

  • Early support for ARM 32- and 64-bit architectures
  • qemu-upstream is now the default for VMs not using stub domains. You can change this by adding device_model_version = "qemu-xen-traditional" to your config file.
  • openvswitch hot-plug script support. See the Open vSwitch section of Xen Networking for more details.
  • NUMA affinity for the scheduler
  • xl can now accept several USB devices, rather than only one, using the following syntax: usbdevice=["device1","device2",...] The old format is still supported.
  • XSM improvements. XSM can now override all IS_PRIV checks in the hypervisor.
  • As always, a number of stability, performance, and security enhancements "under the hood".

New in version 4.2.2 (May 17th, 2013)

  • CVE-2012-5634 / XSA-33: VT-d interrupt remapping source validation flaw
  • CVE-2013-0151 / XSA-34: nested virtualization on 32-bit exposes host crash
  • CVE-2013-0152 / XSA-35: Nested HVM exposes host to being driven out of memory by guest
  • CVE-2013-0153 / XSA-36: interrupt remap entries shared and old ones not cleared on AMD IOMMUs
  • CVE-2013-0154 / XSA-37: Hypervisor crash due to incorrect ASSERT (debug build only)
  • CVE-2013-0215 / XSA-38: oxenstored incorrect handling of certain Xenbus ring states
  • CVE-2012-6075 / XSA-41: qemu (e1000 device driver): Buffer overflow when processing large packets
  • CVE-2013-1917 / XSA-44: Xen PV DoS vulnerability with SYSENTER
  • CVE-2013-1919 / XSA-46: Several access permission issues with IRQs for unprivileged guests
  • CVE-2013-1920 / XSA-47: Potential use of freed memory in event channel operations
  • CVE-2013-1922 / XSA-48: qemu-nbd format-guessing due to missing format specification

New in version 4.1.5 (May 17th, 2013)

  • CVE-2012-5634 / XSA-33: VT-d interrupt remapping source validation flaw
  • CVE-2013-0153 / XSA-36: interrupt remap entries shared and old ones not cleared on AMD IOMMUs
  • CVE-2013-0215 / XSA-38: oxenstored incorrect handling of certain Xenbus ring states
  • CVE-2012-6075 / XSA-41: qemu (e1000 device driver): Buffer overflow when processing large packets
  • CVE-2013-1917 / XSA-44: Xen PV DoS vulnerability with SYSENTER
  • CVE-2013-1919 / XSA-46: Several access permission issues with IRQs for unprivileged guests
  • CVE-2013-1920 / XSA-47: Potential use of freed memory in event channel operations
  • CVE-2013-1964 / XSA-50: grant table hypercall acquire/release imbalance

New in version 3.3.1 (January 13th, 2009)

  • This release adds power management (P & C states) in the hypervisor, PVSCSI drivers, and HVM emulation domains.
  • It has improved paravirtualization, device passthrough, hardware-assisted paging, HVM framebuffer, and shadow pagetable performance.
  • It has improved safety of domain transfer across systems with different CPU models.
  • There are assorted bugfixes and other minor enhancements.