01 Apr 2017 - Xen 4.4 has reached EOL

As per the Xen Feature Matrix, Xen 4.4 has reached the end of security support

All users are advised to update to a supported release as soon as possible


Version Support Timeline
Version End of Support End of Security Fixes
4.4 EOL Sept 2015 March 2017
4.5 EOL July 2016 Jan 2018
4.6 April 2017 Oct 2018
4.7 Dec 2017 Jun 2019
4.9 Jan 2019 July 2020
4.10 June 2020 Dec 2021


Stable Repositories

kernel-xen-4: Thu Jan 18 2018 Steven Haigh <netwiz@crc.id.au> - 4.14.14-1 (Full Changelog) - Update to 4.14.14

xen46-4.6: Tue Dec 12 2017 Steven Haigh <netwiz@crc.id.au> - 4.6.6-12 (Full Changelog) - XSA248 (CVE-TBA) x86 PV guests may gain access to internally used pages - XSA249 (CVE-TBA) broken x86 shadow mode refcount overflow check - XSA250 (CVE-TBA) improper x86 shadow mode refcount error handling - XSA251 (CVE-TBA) improper bug check in x86 log-dirty handling - Update to XSA240 patchset v6

xen47-4.7: Tue Dec 12 2017 Steven Haigh <netwiz@crc.id.au> - 4.7.4-2 (Full Changelog) - XSA248 (CVE-TBA) x86 PV guests may gain access to internally used pages - XSA249 (CVE-TBA) broken x86 shadow mode refcount overflow check - XSA250 (CVE-TBA) improper x86 shadow mode refcount error handling - XSA251 (CVE-TBA) improper bug check in x86 log-dirty handling - Update XSA240 patchset to v6

xen49-4.9: Tue Dec 12 2017 Steven Haigh <netwiz@crc.id.au> - 4.9.1-2 (Full Changelog) - XSA248 (CVE-TBA) x86 PV guests may gain access to internally used pages - XSA249 (CVE-TBA) broken x86 shadow mode refcount overflow check - XSA250 (CVE-TBA) improper x86 shadow mode refcount error handling - XSA251 (CVE-TBA) improper bug check in x86 log-dirty handling - Update XSA240 patches to v6

Testing Repositories

xen410-4.10: Thu Jan 04 2018 Glenn Enright <glenn@rimuhosting.com> - 4.10.0-1 (Full Changelog) - Initial Test Build.