--- /dev/null
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml">
+<head>
+<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
+ <title>Xen Hypervisor Source</title>
+ <meta name="description" content="Xen.org, home of the Xen® hypervisor, the powerful open source industry standard for virtualization.">
+ <meta name="keywords" content="xen 2.0, xen 3.0, hypervisor, server consolidation, open source, ian pratt, virtualization, virtualisation, xen, xensource">
+ <link href="/css/community_main7.css" rel="stylesheet" type="text/css">
+ <script type="text/javascript" src="/globals/javascript.js"></script>
+<script type="text/javascript" src="/globals/milonic_src.js"></script>
+ <script type="text/javascript">
+if(ns4)_d.write("<scr"+"ipt type=text/javascript src=/globals/mmenuns4.js><\/scr"+"ipt>");
+ else _d.write("<scr"+"ipt type=text/javascript src=/globals/mmenudom.js><\/scr"+"ipt>");
+
+</script>
+<script type="text/javascript" src="/globals/menu_data_xenorg_main.js"></script>
+ <meta http-equiv="Content-Type" content="text/html;charset=UTF-8">
+ <link rel="shortcut icon" href="/favicon.ico">
+
+</head>
+
+<body>
+<table border="0" cellpadding="0" cellspacing="0" align="center" id="xen_mainTable">
+ <tr>
+ <td class="mainTableTopCell"> </td>
+ <td class="mainTableTopCell"> </td>
+
+ </tr>
+ <tr>
+ <td height="10" class="corner_tl"><a name="topofpage" id="topofpage"></a><img src="/images/globals/pixel.gif" alt="" width="700" height="9" /></td>
+ <td class="corner_tr"> </td>
+ </tr>
+<!-- header -->
+ <!--#include virtual="/includes/header_products.html" -->
+<!-- end header -->
+
+ <tr>
+
+ <td id="xen_navSecond"><a href="/products/index.html" >Products</a> | <a href="/products/downloads.html">Downloads</a> | <a href="/products/xenhyp.html" class="navSecondOnpage">Xen Hypervisor</a> |
+ <a href="/products/xen_arm.html">Xen ARM</a> | <a href="/products/cloudxen.html">Xen Cloud Platform</a> | <a href="/products/projectgov.html">Governance</a> | <a href="/community/projects.html" class="xen_last">Solution Search</a> </td>
+ <td id="xen_navSecondRt"> </td>
+ </tr>
+ <tr>
+
+ <td id="xen_content"><div class="xen_navThird"> </div>
+ <!-- begin callout -->
+
+
+<h1>Xen Hypervisor 4.1.4 Download</h1>
+ <p> Welcome to the Xen 4.1.4 download page! We recommend all users of the 4.1 stable series to update to this latest point release.</p>
+ <p></p>
+ <p>Xen 4.1.4 is a maintenance release in the 4.1 series and contains:</p>
+ <ul>
+ <li>Fixes for the following critical vulnerabilities: We recommend all users of the 4.0 and 4.1 stable series to update to these latest point releases.</li>
+ <ul>
+ <li>CVE-2012-3494 / XSA-12: hypercall set_debugreg vulnerability</li>
+ <li>CVE-2012-3495 / XSA-13: hypercall physdev_get_free_pirq vulnerability</li>
+ <li>CVE-2012-3496 / XSA-14: XENMEM_populate_physmap DoS vulnerability</li>
+ <li>CVE-2012-3498 / XSA-16: PHYSDEVOP_map_pirq index vulnerability</li>
+ <li>CVE-2012-3515 / XSA-17: Qemu VT100 emulation vulnerability</li>
+ <li>CVE-2012-4411 / XSA-19: guest administrator can access qemu monitor console</li>
+ <li>CVE-2012-4535 / XSA-20: Timer overflow DoS vulnerability</li>
+ <li>CVE-2012-4536 / XSA-21: pirq range check DoS vulnerability</li>
+ <li>CVE-2012-4537 / XSA-22: Memory mapping failure DoS vulnerability</li>
+ <li>CVE-2012-4538 / XSA-23: Unhooking empty PAE entries DoS vulnerability</li>
+ <li>CVE-2012-4539 / XSA-24: Grant table hypercall infinite loop DoS vulnerability</li>
+ <li>CVE-2012-4544,CVE-2012-2625 / XSA-25: Xen domain builder Out-of-memory due to malicious kernel/ramdisk</li>
+ <li>CVE-2012-5510 / XSA-26: Grant table version switch list corruption vulnerability</li>
+ <li>CVE-2012-5511 / XSA-27: several HVM operations do not validate the range of their inputs</li>
+ <li>CVE-2012-5512 / XSA-28: HVMOP_get_mem_access crash / HVMOP_set_mem_access information leak</li>
+ <li>CVE-2012-5513 / XSA-29: XENMEM_exchange may overwrite hypervisor memory</li>
+ <li>CVE-2012-5514 / XSA-30: Broken error handling in guest_physmap_mark_populate_on_demand()</li>
+ <li>CVE-2012-5515 / XSA-31: Several memory hypercall operations allow invalid extent order values</li>
+ </ul>
+ <li>Among many bug fixes and improvements (almost 100 since Xen 4.1.3). Highlights are:</li>
+ <ul>
+ <li>A fix for a long standing time management issue</li>
+ <li>Bug fixes for S3 (suspend to RAM) handling</li>
+ <li>Bug fixes for other low level system state handling</li>
+ </ul>
+ </ul>
+ <p>It also contains the following fixes from earlier maintenance releases:</p>
+ <ul>
+ <li>Security fixes including CVE-2011-1583, CVE-2011-1898, CVE-2012-0217 / XSA-7, CVE-2012-0218 / XSA-8,
+ CVE-2012-2934 / XSA-9, CVE-2012-3432 / XSA-10 and CVE-2012-3433 / XSA-11</li>
+ <li>Enhancements to guest introspection (VM single stepping support for very fine-grained access control)</li>
+ <li>Many bug fixes and improvements, such as:</li>
+ <ul>
+ <li>Updates for the latest Intel/AMD CPU revisions</li>
+ <li>Bug fixes and improvements to the libxl tool stack</li>
+ <li>Bug fixes for IOMMU handling (device passthrough to HVM guests)</li>
+ <li>Bug fixes for host kexec/kdump</li>
+ <li>PV-on-HVM stability fixes (fixing some IRQ issues)</li>
+ <li>XSAVE cpu feature support for PV guests (allows safe use of latest multimedia instructions)</li>
+ <li>RAS fixes for high availability</li>
+ <li>fixes for offlining bad pages</li>
+ <li>changes to libxc, mainly of benefit to libvirt</li>
+ <li>New XL toolstack</li>
+ <li>Debug support: kexec/kdump</li>
+ <li>Remus (High Availability)</li>
+ <li>Device passthrough to HVM guests</li>
+ <li>Interrupt handling</li>
+ <li>Support for Supervisor Mode Execution Protection (SMEP)</li>
+ </ul>
+ <li>Compatibility fixes for newer Linux guests, newer compilers, some old guest savefiles, newer Python, grub2, some hardware/BIOS bugs.</li>
+ </ul>
+
+ <p> The Xen 4.1 release contains a number of important new features and updates including:</p>
+ <ul>
+ <li>A re-architected XL toolstack that is functionally nearly equivalent to XM/XEND</li>
+ <li>Prototype credit2 scheduler designed for latency-sensitive workloads and very large systems</li>
+ <li>CPU Pools for advanced partitioning</li>
+ <li>Support for large systems (>255 processors and 1GB/2MB super page support)</li>
+ <li>Support for x86 Advanced Vector eXtension (AVX)</li>
+ <li>New Memory Access API enabling integration of 3rd party security solutions into Xen virtualized environments</li>
+ <li>Even better stability through our new automated regression tests</li>
+ <li>Xen 4.1 <a href="http://wiki.xen.org/wiki/Xen4.1" target="_blank">Release Notes</a></li>
+ <li><a href="/files/Xen_4_1_Datasheet.pdf" onClick="javascript:urchinTracker ('XenDataSheet41');">Xen 4.1 Datasheet</a></li>
+ </ul>
+ </p>
+</p>
+
+ <table width="800" border="0" cellpadding="0" cellspacing="0" class="servicestable">
+ <tr class="headerText">
+ <td width="230"> </td>
+ <td width="250">Description</td>
+
+ <td width="100"><div align="center">Download</div></td>
+ </tr>
+
+ <tr class="headerText">
+ <td>Tarball</td>
+ <td> </td>
+ <td> </td>
+ <td> </td>
+
+ </tr>
+ <tr>
+ <td><img src="/images/logos/xen_gen_logo.gif" alt="Xen 4.1.4" width="81" hspace="5" /> tarball</td>
+ <td>Xen 4.1.4 (hypervisor and tools) official source distribution</td>
+ <td><a href="http://bits.xensource.com/oss-xen/release/4.1.4/xen-4.1.4.tar.gz">
+ <img src="/images/download/download_http.gif" alt="download" width="95" height="50" border="0" /></a>
+ </td>
+ <td><a href="http://bits.xensource.com/oss-xen/release/4.1.4/xen-4.1.4.tar.gz.sig">signature</a></td>
+ </tr>
+ </table>
+
+
+</table>
+
+ <td> </td>
+ </tr>
+ <tr>
+ <td class="corner_bl"> </td>
+ <td class="corner_br"> </td>
+ </tr>
+</table>
+
+
+<!--#include virtual="/includes/copyright.html" -->
+<!--#include virtual="/includes/statscode.html" --></body>
+</html>