libxenstore3.0_4.9.2-0ubuntu1_amd64.deb


Advertisement

Description

libxenstore3.0 - Xenstore communications library for Xen

Property Value
Distribution Ubuntu 18.04 LTS (Bionic Beaver)
Repository Ubuntu Main amd64
Package name libxenstore3.0
Package version 4.9.2
Package release 0ubuntu1
Package architecture amd64
Package type deb
Installed size 84 B
Download size 19.23 KB
Official Mirror archive.ubuntu.com
This package contains the client library interface to XenStore.  .

Alternatives

Package Version Architecture Repository
libxenstore3.0_4.9.2-0ubuntu1_i386.deb 4.9.2 i386 Ubuntu Main
libxenstore3.0 - - -

Requires

Name Value
libc6 >= 2.14

Download

Type URL
Binary Package libxenstore3.0_4.9.2-0ubuntu1_amd64.deb
Source Package xen

Install Howto

  1. Update the package index:
    # sudo apt-get update
  2. Install libxenstore3.0 deb package:
    # sudo apt-get install libxenstore3.0

Files

Path
/usr/lib/x86_64-linux-gnu/libxenstore.so.3.0
/usr/lib/x86_64-linux-gnu/libxenstore.so.3.0.3
/usr/share/doc/libxenstore3.0/changelog.Debian.gz
/usr/share/doc/libxenstore3.0/copyright

Changelog

2018-04-12 - Stefan Bader <stefan.bader@canonical.com>
xen (4.9.2-0ubuntu1) bionic; urgency=medium
* Update to upstream 4.9.2 release (LP: #1763354).
Changes include numerous bugfixes, including security fixes/updates.
4.9.0 -> 4.9.1:
- XSA-226 / CVE-2017-12135 (replacement)
- XSA-227 / CVE-2017-12137 (replacement)
- XSA-228 / CVE-2017-12136 (replacement)
- XSA-230 / CVE-2017-12855 (replacement)
- XSA-231 / CVE-2017-14316 (replacement)
- XSA-232 / CVE-2017-14318 (replacement)
- XSA-233 / CVE-2017-14317 (replacement)
- XSA-234 / CVE-2017-14319 (replacement)
- XSA-235 / CVE-2017-15596 (replacement)
- XSA-236 / CVE-2017-15597 (new)
- XSA-237 / CVE-2017-15590 (replacement)
- XSA-238 / CVE-2017-15591 (replacement)
- XSA-239 / CVE-2017-15589 (replacement)
- XSA-240 / CVE-2017-15595 (update)
- XSA-241 / CVE-2017-15588 (replacement)
- XSA-242 / CVE-2017-15593 (replacement)
- XSA-243 / CVE-2017-15592 (replacement)
- XSA-244 / CVE-2017-15594 (replacement)
- XSA-245 / CVE-2017-17046 (replacement)
4.9.1 -> 4.9.2:
- XSA-246 / CVE-2017-17044 (new)
- XSA-247 / CVE-2017-17045 (new)
- XSA-248 / CVE-2017-17566 (new)
- XSA-249 / CVE-2017-17563 (new)
- XSA-250 / CVE-2017-17564 (new)
- XSA-251 / CVE-2017-17565 (new)
- XSA-252 / CVE-2018-7540  (new)
- XSA-254 / CVE-2017-5754  (new / XPTI Meltdown mitigation)
- XSA-255 / CVE-2018-7541  (new)
- XSA-256 / CVE-2018-7542  (new)
* Dropped:
d/p/ubuntu/tools-fix-ftbs-arm.patch (upstream)
2018-04-06 - Dimitri John Ledkov <xnox@ubuntu.com>
xen (4.9.0-0ubuntu4) bionic; urgency=medium
* Compile and ship vhd-util.
* Add dh-python to build-depends.
2017-10-10 - Stefan Bader <stefan.bader@canonical.com>
xen (4.9.0-0ubuntu3) artful; urgency=medium
* Applying Xen Security Advisories:
- CVE-2017-12135 / XSA-226
- Revert: grant_table: Default to v1, and disallow transitive grants
- gnttab: don't use possibly unbounded tail calls
- gnttab: fix transitive grant handling
- CVE-2017-14316 / XSA-231
- xen/mm: make sure node is less than MAX_NUMNODES
- CVE-2017-14318 / XSA-232
- grant_table: fix GNTTABOP_cache_flush handling
- CVE-2017-14317 / XSA-233
- tools/xenstore: dont unlink connection object twice
- CVE-2017-14319 / XSA-234
- gnttab: also validate PTE permissions upon destroy/replace
- XSA-235
- arm/mm: release grant lock on xenmem_add_to_physmap_one() error paths
- XSA-237
- x86: don't allow MSI pIRQ mapping on unowned device
- x86: enforce proper privilege when (un)mapping pIRQ-s
- x86/MSI: disallow redundant enabling
- x86/IRQ: conditionally preserve irq <-> pirq mapping on map error paths
- x86/FLASK: fix unmap-domain-IRQ XSM hook
- XSA-238
- x86/ioreq server: correctly handle bogus
XEN_DMOP_{,un}map_io_range_to_ioreq_server arguments
- XSA-239
- x86/HVM: prefill partially used variable on emulation paths
- XSA-240
- x86: limit linear page table use to a single level
- x86/mm: Disable PV linear pagetables by default
- XSA-241
- x86: don't store possibly stale TLB flush time stamp
- XSA-242
- x86: don't allow page_unlock() to drop the last type reference
- XSA-243
- x86/shadow: Don't create self-linear shadow mappings for 4-level
translated guests
- XSA-244
- x86/cpu: Fix IST handling during PCPU bringup
- XSA-245
- xen/page_alloc: Cover memory unreserved after boot in first_valid_mfn
- xen/arm: Correctly report the memory region in the dummy NUMA helpers
2017-08-18 - Stefan Bader <stefan.bader@canonical.com>
xen (4.9.0-0ubuntu2) artful; urgency=medium
* Add libxendevicemodel references to d/libxen-dev.install

See Also

Package Description
libxext-dev_1.3.3-1_amd64.deb X11 miscellaneous extensions library (development headers)
libxext-doc_1.3.3-1_all.deb X11 miscellaneous extensions library (documentation)
libxext6_1.3.3-1_amd64.deb X11 miscellaneous extension library
libxfixes-dev_5.0.3-1_amd64.deb X11 miscellaneous 'fixes' extension library (development headers)
libxfixes3_5.0.3-1_amd64.deb X11 miscellaneous 'fixes' extension library
libxfont-dev_2.0.3-1_amd64.deb X11 font rasterisation library (development headers)
libxfont2_2.0.3-1_amd64.deb X11 font rasterisation library
libxft-dev_2.3.2-1_amd64.deb FreeType-based font drawing library for X (development files)
libxft2_2.3.2-1_amd64.deb FreeType-based font drawing library for X
libxi-dev_1.7.9-1_amd64.deb X11 Input extension library (development headers)
libxi6_1.7.9-1_amd64.deb X11 Input extension library
libxinerama-dev_1.1.3-1_amd64.deb X11 Xinerama extension library (development headers)
libxinerama1_1.1.3-1_amd64.deb X11 Xinerama extension library
libxkbcommon-dev_0.8.0-1_amd64.deb library interface to the XKB compiler - development files
libxkbcommon-x11-0_0.8.0-1_amd64.deb library to create keymaps with the XKB X11 protocol
Advertisement
Advertisement