Linux repositories inspector

libxen-dev - Public headers and libs for Xen

This package contains the public headers and static libraries for Xen.
The libxenlight library is intended as a common base for all Xen toolstack developers. The libxlutil library contains additional helpers which may be useful to toolstack developers.
The libxenstore library allows userspace processes to interact with the XenStore database. XenStore is a shared database used for interdomain communication of configuration and status information. It is accessible to all domains running on the same Xen host. See
http://wiki.xen.org/wiki/XenStore for more information.
The libxenctrl and libxenguest libraries are internal libraries intended for use by the Xen toolstack and are not intended to be used directly. Toolstack authors should use libxenlight.
Original maintainer
4.9.2
Ubuntu iconUbuntu 18.04 LTS
4.9.0
Ubuntu iconUbuntu 17.10
4.8.3
Debian iconDebian 10.0
Debian iconDebian 9.0
4.6.5
Ubuntu iconUbuntu 16.04 LTS
4.6.0
Ubuntu iconUbuntu 16.04 LTS
DistributionVersionSincePackageInstalledPackager
Debian iconDebian 10.0 buster/maindeb4.8.3+comet2+shim4.10.0+comet3-1+deb9u514.03.2018638 kiB3.27 MiB
Debian iconDebian 9.0 stretch/maindeb4.8.3+comet2+shim4.10.0+comet3-1+deb9u514.03.2018638 kiB3.27 MiB
Debian iconDebian 9.0 stretch-proposed-updates/maindeb4.8.3+xsa262+shim4.10.0+comet3-1+deb9u719.06.2018637 kiB3.25 MiB
Ubuntu iconUbuntu 17.10 artful/maindeb4.9.0-0ubuntu310.11.2017646 kiB3.5 MiB
Ubuntu iconUbuntu 18.04 LTS bionic/maindeb4.9.2-0ubuntu112.06.2018647 kiB3.5 MiB
Ubuntu iconUbuntu 16.04 LTS xenial/maindeb4.6.0-1ubuntu410.11.2017545 kiB2.82 MiB
Ubuntu iconUbuntu 16.04 LTS xenial-security/maindeb4.6.5-0ubuntu1.410.11.2017546 kiB2.83 MiB
Ubuntu iconUbuntu 16.04 LTS xenial-updates/maindeb4.6.5-0ubuntu1.410.11.2017546 kiB2.83 MiB

Latest updates

Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Version 4.8.3+xsa262+shim4.10.0+comet3-1+deb9u7 introduced

19.06.2018 07:50
Ubuntu 18.04 LTS icon

Ubuntu 18.04 LTS bionic/main: Updated from 4.9.0-0ubuntu3 to 4.9.2-0ubuntu1

12.06.2018 08:30
See package libxenstore3.0
Debian 10.0 icon

Debian 10.0 buster/main: Updated from 4.8.2+xsa245-0+deb9u1 to 4.8.3+comet2+shim4.10.0+comet3-1+deb9u5

14.03.2018 02:50
  • Security fixes from upstream XSAs:

    XSA-252 CVE-2018-7540
    XSA-255 CVE-2018-7541
    XSA-256 CVE-2018-7542

    The upstream BTI changes from XSA-254 (Spectre v2 mitigation) are *not* included. They are currently failing in upstream CI.
  • init scripts: Do not kill per-domain qemu processes. Closes:#879751.
  • Install Meltdown READMEs on all architectures. Closes:#890488.
  • Ship xen-diag (by cherry-picking the appropriate commits from upstream). This can help with diagnosis of #880554.
Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Version 4.8.3+comet2+shim4.10.0+comet3-1+deb9u5 removed

14.03.2018 02:47
Debian 9.0 icon

Debian 9.0 stretch/main: Updated from 4.8.2+xsa245-0+deb9u1 to 4.8.3+comet2+shim4.10.0+comet3-1+deb9u5

14.03.2018 02:46
  • Security fixes from upstream XSAs:

    XSA-252 CVE-2018-7540
    XSA-255 CVE-2018-7541
    XSA-256 CVE-2018-7542

    The upstream BTI changes from XSA-254 (Spectre v2 mitigation) are *not* included. They are currently failing in upstream CI.
  • init scripts: Do not kill per-domain qemu processes. Closes:#879751.
  • Install Meltdown READMEs on all architectures. Closes:#890488.
  • Ship xen-diag (by cherry-picking the appropriate commits from upstream). This can help with diagnosis of #880554.
Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Updated from 4.8.3+comet2+shim4.10.0+comet3-1+deb9u4.1 to 4.8.3+comet2+shim4.10.0+comet3-1+deb9u5

07.03.2018 04:26
  • Security fixes from upstream XSAs:

    XSA-252 CVE-2018-7540
    XSA-255 CVE-2018-7541
    XSA-256 CVE-2018-7542

    The upstream BTI changes from XSA-254 (Spectre v2 mitigation) are *not* included. They are currently failing in upstream CI.
  • init scripts: Do not kill per-domain qemu processes. Closes:#879751.
  • Install Meltdown READMEs on all architectures. Closes:#890488.
  • Ship xen-diag (by cherry-picking the appropriate commits from upstream). This can help with diagnosis of #880554.
Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Version 4.8.3+comet2+shim4.10.0+comet3-1+deb9u4.1 introduced

26.02.2018 04:22
  • Fix builds on other than amd64.
Debian 10.0 icon

Debian 10.0 buster/main: Updated from 4.8.1-1+deb9u3 to 4.8.2+xsa245-0+deb9u1

10.12.2017 22:37
  • Update to upstream stable 4.8 branch, which is currently at Xen 4.8.2 plus a number of bugfixes and security fixes.
    Result is that we now include security fixes for:

    XSA-231 CVE-2017-14316
    XSA-232 CVE-2017-14318
    XSA-233 CVE-2017-14317
    XSA-234 CVE-2017-14319
    (235 already included in 4.8.1-1+deb9u3)
    XSA-236 CVE-2017-15597
    XSA-237 CVE-2017-15590
    XSA-238 (no CVE yet)
    XSA-239 CVE-2017-15589
    XSA-240 CVE-2017-15595
    XSA-241 CVE-2017-15588
    XSA-242 CVE-2017-15593
    XSA-243 CVE-2017-15592
    XSA-244 CVE-2017-15594
    XSA-245 (no CVE yet)

    and a number of upstream functionality fixes, which are not easily disentangled from the security fixes.
  • Apply two more security fixes:

    XSA-246 (no CVE yet)
    XSA-247 (no CVE yet)

Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Version 4.8.2+xsa245-0+deb9u1 removed

09.12.2017 06:35
Debian 9.0 icon

Debian 9.0 stretch/main: Updated from 4.8.1-1+deb9u3 to 4.8.2+xsa245-0+deb9u1

09.12.2017 05:58
  • Update to upstream stable 4.8 branch, which is currently at Xen 4.8.2 plus a number of bugfixes and security fixes.
    Result is that we now include security fixes for:

    XSA-231 CVE-2017-14316
    XSA-232 CVE-2017-14318
    XSA-233 CVE-2017-14317
    XSA-234 CVE-2017-14319
    (235 already included in 4.8.1-1+deb9u3)
    XSA-236 CVE-2017-15597
    XSA-237 CVE-2017-15590
    XSA-238 (no CVE yet)
    XSA-239 CVE-2017-15589
    XSA-240 CVE-2017-15595
    XSA-241 CVE-2017-15588
    XSA-242 CVE-2017-15593
    XSA-243 CVE-2017-15592
    XSA-244 CVE-2017-15594
    XSA-245 (no CVE yet)

    and a number of upstream functionality fixes, which are not easily disentangled from the security fixes.
  • Apply two more security fixes:

    XSA-246 (no CVE yet)
    XSA-247 (no CVE yet)

⇧ Top