]> xenbits.xensource.com Git - people/larsk/xenproject-org-websites.git/commitdiff
Added 4.1.4
authorlarsk <lars.kurth@citrix.com>
Tue, 18 Dec 2012 13:20:58 +0000 (13:20 +0000)
committerlarsk <lars.kurth@citrix.com>
Tue, 18 Dec 2012 13:20:58 +0000 (13:20 +0000)
xen.org/download/index_4.1.4.html [new file with mode: 0644]
xen.org/index.html
xen.org/products/downloads.html
xen.org/products/xen_archives.html

diff --git a/xen.org/download/index_4.1.4.html b/xen.org/download/index_4.1.4.html
new file mode 100644 (file)
index 0000000..c95a7b8
--- /dev/null
@@ -0,0 +1,162 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml">
+<head>
+<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
+    <title>Xen Hypervisor Source</title>
+       <meta name="description" content="Xen.org, home of the Xen® hypervisor, the powerful open source industry standard for virtualization.">
+       <meta name="keywords" content="xen 2.0, xen 3.0, hypervisor, server consolidation, open source, ian pratt, virtualization, virtualisation, xen, xensource">
+       <link href="/css/community_main7.css" rel="stylesheet" type="text/css">
+       <script type="text/javascript" src="/globals/javascript.js"></script>
+<script type="text/javascript" src="/globals/milonic_src.js"></script> 
+       <script type="text/javascript">
+if(ns4)_d.write("<scr"+"ipt type=text/javascript src=/globals/mmenuns4.js><\/scr"+"ipt>");             
+  else _d.write("<scr"+"ipt type=text/javascript src=/globals/mmenudom.js><\/scr"+"ipt>"); 
+
+</script>
+<script type="text/javascript" src="/globals/menu_data_xenorg_main.js"></script>       
+       <meta http-equiv="Content-Type" content="text/html;charset=UTF-8">
+       <link rel="shortcut icon" href="/favicon.ico">
+
+</head>
+
+<body>
+<table  border="0" cellpadding="0" cellspacing="0" align="center" id="xen_mainTable">
+  <tr>
+    <td class="mainTableTopCell">&nbsp;</td>
+  <td class="mainTableTopCell">&nbsp;</td>
+
+  </tr>
+  <tr>
+    <td height="10" class="corner_tl"><a name="topofpage" id="topofpage"></a><img src="/images/globals/pixel.gif" alt="" width="700" height="9" /></td>
+  <td class="corner_tr">&nbsp;</td>
+  </tr>
+<!-- header -->
+       <!--#include virtual="/includes/header_products.html" -->
+<!-- end header -->      
+
+  <tr>
+
+    <td id="xen_navSecond"><a href="/products/index.html" >Products</a> | <a href="/products/downloads.html">Downloads</a> | <a href="/products/xenhyp.html" class="navSecondOnpage">Xen Hypervisor</a> | 
+     <a href="/products/xen_arm.html">Xen ARM</a> | <a href="/products/cloudxen.html">Xen Cloud Platform</a> | <a href="/products/projectgov.html">Governance</a> | <a href="/community/projects.html"  class="xen_last">Solution Search</a> </td>
+    <td id="xen_navSecondRt">&nbsp;</td>
+  </tr>
+  <tr>
+
+    <td id="xen_content"><div class="xen_navThird">&nbsp;</div>
+        <!-- begin callout -->
+   
+<h1>Xen Hypervisor 4.1.4 Download</h1>
+    <p> Welcome to the Xen 4.1.4 download page! We recommend all users of the 4.1 stable series to update to this latest point release.</p>
+    <p></p>
+    <p>Xen 4.1.4 is a maintenance release in the 4.1 series and contains:</p>
+        <ul>
+         <li>Fixes for the following critical vulnerabilities: We recommend all users of the 4.0 and 4.1 stable series to update to these latest point releases.</li>
+         <ul>
+           <li>CVE-2012-3494 / XSA-12: hypercall set_debugreg vulnerability</li>
+           <li>CVE-2012-3495 / XSA-13: hypercall physdev_get_free_pirq vulnerability</li>
+           <li>CVE-2012-3496 / XSA-14: XENMEM_populate_physmap DoS vulnerability</li>
+           <li>CVE-2012-3498 / XSA-16: PHYSDEVOP_map_pirq index vulnerability</li>
+           <li>CVE-2012-3515 / XSA-17: Qemu VT100 emulation vulnerability</li>
+           <li>CVE-2012-4411 / XSA-19: guest administrator can access qemu monitor console</li>
+           <li>CVE-2012-4535 / XSA-20: Timer overflow DoS vulnerability</li>
+           <li>CVE-2012-4536 / XSA-21: pirq range check DoS vulnerability</li>
+           <li>CVE-2012-4537 / XSA-22: Memory mapping failure DoS vulnerability</li>
+           <li>CVE-2012-4538 / XSA-23: Unhooking empty PAE entries DoS vulnerability</li>
+           <li>CVE-2012-4539 / XSA-24: Grant table hypercall infinite loop DoS vulnerability</li>
+           <li>CVE-2012-4544,CVE-2012-2625 / XSA-25: Xen domain builder Out-of-memory due to malicious kernel/ramdisk</li>
+           <li>CVE-2012-5510 / XSA-26: Grant table version switch list corruption vulnerability</li>
+           <li>CVE-2012-5511 / XSA-27: several HVM operations do not validate the range of their inputs</li>
+           <li>CVE-2012-5512 / XSA-28: HVMOP_get_mem_access crash / HVMOP_set_mem_access information leak</li>
+           <li>CVE-2012-5513 / XSA-29: XENMEM_exchange may overwrite hypervisor memory</li>
+           <li>CVE-2012-5514 / XSA-30: Broken error handling in guest_physmap_mark_populate_on_demand()</li>
+           <li>CVE-2012-5515 / XSA-31: Several memory hypercall operations allow invalid extent order values</li>
+         </ul>
+         <li>Among many bug fixes and improvements (almost 100 since Xen 4.1.3). Highlights are:</li>
+         <ul>
+           <li>A fix for a long standing time management issue</li>
+           <li>Bug fixes for S3 (suspend to RAM) handling</li>
+           <li>Bug fixes for other low level system state handling</li>
+         </ul>
+        </ul>    
+    <p>It also contains the following fixes from earlier maintenance releases:</p>
+        <ul>     
+       <li>Security fixes including CVE-2011-1583, CVE-2011-1898, CVE-2012-0217 / XSA-7, CVE-2012-0218 / XSA-8,
+           CVE-2012-2934 / XSA-9, CVE-2012-3432 / XSA-10 and CVE-2012-3433 / XSA-11</li>
+       <li>Enhancements to guest introspection (VM single stepping support for very fine-grained access control)</li>
+       <li>Many bug fixes and improvements, such as:</li>
+       <ul>
+          <li>Updates for the latest Intel/AMD CPU revisions</li>
+          <li>Bug fixes and improvements to the libxl tool stack</li>
+          <li>Bug fixes for IOMMU handling (device passthrough to HVM guests)</li>
+          <li>Bug fixes for host kexec/kdump</li>
+          <li>PV-on-HVM stability fixes (fixing some IRQ issues)</li>
+          <li>XSAVE cpu feature support for PV guests (allows safe use of latest multimedia instructions)</li>
+          <li>RAS fixes for high availability</li>
+          <li>fixes for offlining bad pages</li>
+          <li>changes to libxc, mainly of benefit to libvirt</li>
+          <li>New XL toolstack</li>
+          <li>Debug support: kexec/kdump</li>
+          <li>Remus (High Availability)</li>
+          <li>Device passthrough to HVM guests</li>
+          <li>Interrupt handling</li>
+          <li>Support for Supervisor Mode Execution Protection (SMEP)</li>
+       </ul>
+        <li>Compatibility fixes for newer Linux guests, newer compilers, some old  guest savefiles, newer Python, grub2, some hardware/BIOS bugs.</li>
+        </ul>
+
+    <p> The Xen 4.1 release contains a number of important new features and updates including:</p>
+        <ul>     
+          <li>A re-architected XL toolstack that is functionally nearly equivalent to XM/XEND</li>
+          <li>Prototype credit2 scheduler designed for latency-sensitive workloads and very large systems</li>
+          <li>CPU Pools for advanced partitioning</li>
+         <li>Support for large systems (>255 processors and 1GB/2MB super page support)</li>
+          <li>Support for x86 Advanced Vector eXtension (AVX)</li>
+          <li>New Memory Access API enabling integration of 3rd party security solutions into Xen virtualized environments</li>
+          <li>Even better stability through our new automated regression tests</li>
+          <li>Xen 4.1 <a href="http://wiki.xen.org/wiki/Xen4.1" target="_blank">Release Notes</a></li>
+          <li><a href="/files/Xen_4_1_Datasheet.pdf" onClick="javascript:urchinTracker ('XenDataSheet41');">Xen 4.1 Datasheet</a></li>
+        </ul>
+    </p>
+</p>
+    
+        <table width="800"  border="0" cellpadding="0" cellspacing="0" class="servicestable">
+          <tr class="headerText">
+            <td width="230">&nbsp;</td>
+            <td width="250">Description</td>
+
+            <td width="100"><div align="center">Download</div></td>
+          </tr>
+
+          <tr class="headerText">
+            <td>Tarball</td>
+            <td>&nbsp;</td>
+            <td>&nbsp;</td>
+            <td>&nbsp;</td>
+
+          </tr>
+          <tr>
+            <td><img src="/images/logos/xen_gen_logo.gif" alt="Xen 4.1.4" width="81" hspace="5" /> tarball</td>
+            <td>Xen 4.1.4 (hypervisor and tools) official source distribution</td>
+            <td><a href="http://bits.xensource.com/oss-xen/release/4.1.4/xen-4.1.4.tar.gz">
+               <img src="/images/download/download_http.gif" alt="download" width="95" height="50" border="0" /></a>
+           </td>
+            <td><a href="http://bits.xensource.com/oss-xen/release/4.1.4/xen-4.1.4.tar.gz.sig">signature</a></td>
+          </tr>
+         </table>
+
+
+</table>
+
+    <td>&nbsp;</td>
+  </tr>
+  <tr>
+    <td class="corner_bl">&nbsp;</td>
+  <td class="corner_br">&nbsp;</td>
+  </tr>
+</table>
+
+
+<!--#include virtual="/includes/copyright.html" -->
+<!--#include virtual="/includes/statscode.html" --></body>
+</html>
index 3bb4e5e52e89e27331fd7ef61f32990edf563f34..0c248c4c68de1fb2a44fd363441429c546a8c8c0 100644 (file)
@@ -191,8 +191,8 @@ if(ns4)_d.write("<scr"+"ipt type=text/javascript src=/globals/mmenuns4.js><\/scr
              <h2>Latest Product Releases</h2>
              <p><ul>
                <li><b>Xen Hypervisor 4.2.1</b>: <a href="download/index_4.2.1.html">Download</a> (<a href="/products/xen_archives.html">archives</a>) <img src="/images/icons/new.png" align="top" height="17"/></li>
+               <li><b>Xen Hypervisor 4.1.4</b>: <a href="download/index_4.1.4.html">Download</a> (<a href="/products/xen_archives.html">archives</a>) <img src="/images/icons/new.png" align="top" height="17"/></li>
                 <li><b>Xen Cloud Platform 1.6</b>: <a href="download/xcp/index_1.6.0.html">Download</a> (<a href="/products/xcp/archives.html">archives</a>)<img src="/images/icons/new.png" align="top" height="17"/></li>
-               <li><b>Xen Hypervisor 4.1.3</b>: <a href="download/index_4.1.3.html">Download</a> (<a href="/products/xen_archives.html">archives</a>) </li>
                 <li><b>Xen Cloud Platform 1.1</b>: <a href="download/xcp/index_1.1.0.html">Download</a> (<a href="/products/xcp/archives.html">archives</a>)</li>
                <li><b>Xen Hypervisor 4.0.4</b>: <a href="download/index_4.0.4.html">Download</a> (<a href="/products/xen_archives.html">archives</a>) </li>
                <li><a href="/products/downloads.html">Other downloads ...</a></li>
@@ -241,7 +241,7 @@ if(ns4)_d.write("<scr"+"ipt type=text/javascript src=/globals/mmenuns4.js><\/scr
               title : "Xen In the News",
               horizontal : false,
               autoExecuteList : {
-                executeList : ["xen -Xenon -pain -iDNES.cz -Automedia.bg -Lounge -thewhir.com -DAWN.com -GreaterKashmir.com -Express.co.uk -xencase.com -sourceforge.jp -24h -baodatviet.vn -SANGRUR -ijobs.independent.co.uk -PESHAWAR -thenews.com.pk -Xenetic -Fesco -Mengal -Imperion -social -Xen.com -Civic -shopkeepers -Lounge -MMA -Half-Life -ERC -Ladies -GameSpy.com -Xenoport -KMC -insurancenewsnet.com -MEPCO -Liquivision -Minister -recruiting -MIDI -PESCO -Jezzball -Irrigation -Basharat -Centrix -tanning -Xenetic -SEP -Cigar -indiatimes.com -thenews.com.pk -thefrontierpost.com -punjab -greaterkashmir.com -indianexpress.com -SAHIWAL -GURGAON -jobs.thisistotalessex.co.uk -RPG -XENTION -wedding -Kalnirnay -Motzinger -Regulatory -xem -games -art -toys -music -yoga -travel -herbal -guru -incense -lotion -jewellery -tan -ixos -giro -timekeepers -desktop -punjab -pakistan -Kashmir -LESCO -MAYN -Rs -Luxul -Xenetic -Bioscience -Gupta -.NET -Muharram -Pesco -IESCO -tennis"]
+                executeList : ["xen -Hostreview.com -Babu -Blackrock -Gravity -Xenon -pain -iDNES.cz -Automedia.bg -Lounge -thewhir.com -DAWN.com -GreaterKashmir.com -Express.co.uk -xencase.com -sourceforge.jp -24h -baodatviet.vn -SANGRUR -ijobs.independent.co.uk -PESHAWAR -thenews.com.pk -Xenetic -Fesco -Mengal -Imperion -social -Xen.com -Civic -shopkeepers -Lounge -MMA -Half-Life -ERC -Ladies -GameSpy.com -Xenoport -KMC -insurancenewsnet.com -MEPCO -Liquivision -Minister -recruiting -MIDI -PESCO -Jezzball -Irrigation -Basharat -Centrix -tanning -Xenetic -SEP -Cigar -indiatimes.com -thenews.com.pk -thefrontierpost.com -punjab -greaterkashmir.com -indianexpress.com -SAHIWAL -GURGAON -jobs.thisistotalessex.co.uk -RPG -XENTION -wedding -Kalnirnay -Motzinger -Regulatory -xem -games -art -toys -music -yoga -travel -herbal -guru -incense -lotion -jewellery -tan -ixos -giro -timekeepers -desktop -punjab -pakistan -Kashmir -LESCO -MAYN -Rs -Luxul -Xenetic -Bioscience -Gupta -.NET -Muharram -Pesco -IESCO -tennis"]
               }
             }
 
index ff6b01bf7c63724e90189b69d68f2a74557ad07c..6926b22a7fd99f15bb8b6311724d1c79c68b042d 100644 (file)
@@ -60,7 +60,7 @@ if(ns4)_d.write("<scr"+"ipt type=text/javascript src=/globals/mmenuns4.js><\/scr
 <h1>Downloads - Latest Product Releases from Xen.org</h1>
 <h3>Xen Hypervisor Download</h3>
 <p>Xen 4.2.1 is available <a href="/download/index_4.2.1.html">here</a>. <img src="/images/icons/new.png" align="top" height="20"/> </p>
-<p>Xen 4.1.3 is available <a href="/download/index_4.1.3.html">here</a>. </p>
+<p>Xen 4.1.4 is available <a href="/download/index_4.1.4.html">here</a>. <img src="/images/icons/new.png" align="top" height="20"/> </p>
 <p>Xen 3.4.4 is available <a href="/download/index_3.4.4.html">here</a>. </p>
 <h3>Xen Cloud Platform Download</h3>
 <p>XCP 1.6 is available <a href="/download/xcp/index_1.6.0.html">here</a>. <img src="/images/icons/new.png" align="top" height="20"/> </p>
index 3e670baa74cf7d2d21a8bd53934605d096c242b6..844100e189768ed3f8566b5b11bbf4ac3f705d90 100644 (file)
@@ -53,6 +53,7 @@ if(ns4)_d.write("<scr"+"ipt type=text/javascript src=/globals/mmenuns4.js><\/scr
     <ul>
       <li><a href="/download/index_4.2.1.html">Xen 4.2.1</a></li>
       <li><a href="/download/index_4.2.0.html">Xen 4.2.0</a></li>
+      <li><a href="/download/index_4.1.4.html">Xen 4.1.4</a></li>
       <li><a href="/download/index_4.1.3.html">Xen 4.1.3</a></li>
       <li><a href="/download/index_4.1.2.html">Xen 4.1.2</a></li>
       <li><a href="/download/index_4.1.1.html">Xen 4.1.1</a></li>