Linux repositories inspector

libxenstore3.0 - Xenstore communications library for Xen

This package contains the client library interface to XenStore. .
Original maintainer
Homepagehttps://xenproject.org/
4.11.1
Debian iconDebian 10.0
4.9.2
Ubuntu iconUbuntu 18.04 LTS
Ubuntu iconUbuntu 18.10
Ubuntu iconUbuntu 19.04
Ubuntu iconUbuntu 19.10
4.9.0
Ubuntu iconUbuntu 17.10
4.8.5
Debian iconDebian 9.0
4.6.5
Ubuntu iconUbuntu 16.04 LTS
4.6.0
Ubuntu iconUbuntu 16.04 LTS
4.4.1
MX Linux iconMX Linux mx16
DistributionVersionSincePackageInstalledPackager
Debian iconDebian 10.0 buster/maindeb4.11.1+92-g6c33308a8d-222:5938.8 kiB86 kiB
Debian iconDebian 9.0 stretch/maindeb4.8.5+shim4.10.2+xsa282-1+deb9u11Feb 1634.3 kiB75 kiB
MX Linux iconMX Linux mx16 mx16/maindeb4.4.1-9+deb8u7Jan 1430.8 kiB62 kiB
Ubuntu iconUbuntu 17.10 artful/maindeb4.9.0-0ubuntu32017-11-1019.7 kiB84 kiB
Ubuntu iconUbuntu 18.04 LTS bionic/maindeb4.9.2-0ubuntu12018-06-1219.2 kiB84 kiB
Ubuntu iconUbuntu 18.10 cosmic/maindeb4.9.2-0ubuntu2Jan 1419 kiB84 kiB
Ubuntu iconUbuntu 19.04 disco/maindeb4.9.2-0ubuntu2Jan 1419 kiB84 kiB
Ubuntu iconUbuntu 19.10 eoan/maindeb4.9.2-0ubuntu2Jun 1719 kiB84 kiB
Ubuntu iconUbuntu 16.04 LTS xenial/maindeb4.6.0-1ubuntu42017-11-1018.7 kiB79 kiB
Ubuntu iconUbuntu 16.04 LTS xenial-security/maindeb4.6.5-0ubuntu1.42017-11-1021.3 kiB83 kiB
Ubuntu iconUbuntu 16.04 LTS xenial-updates/maindeb4.6.5-0ubuntu1.42017-11-1021.3 kiB83 kiB

Latest updates

Debian 10.0 icon

Debian 10.0 buster/main: Updated from 4.11.1+26-g87f51bf366-3 to 4.11.1+92-g6c33308a8d-2

22:59
Ubuntu 19.10 icon

Ubuntu 19.10 eoan/main: Version 4.9.2-0ubuntu2 introduced

Jun 17
  • No-change rebuild for ncurses soname changes.
Debian 10.0 icon

Debian 10.0 buster/main: Updated from 4.11.1-1 to 4.11.1+26-g87f51bf366-3

Mar 10
Minor useability improvements and fixes:
  • bash-completion: also complete 'xen' [Hans van Kranenburg]
  • /etc/default/xen: Handle with ucf again, like in stretch. Closes:#923401. [Ian Jackson]

Build fix:

  • Fix FTBFS when building only arch-indep binaries (eg dpkg-buildpackage -A). Was due to dh-exec bug wrt not-installed. Closes:#923013. [Hans van Kranenburg; report from Santiago Vila]

Documentation fix:

  • grub.d/xen.cfg: dom0_mem max IS needed [Hans van Kranenburg]

Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Version 4.8.5+shim4.10.2+xsa282-1+deb9u11 removed

Feb 16
Debian 9.0 icon

Debian 9.0 stretch/main: Updated from 4.8.4+xsa273+shim4.10.1+xsa273-1+deb9u10 to 4.8.5+shim4.10.2+xsa282-1+deb9u11

Feb 16
  • Update to new upstream versions:
    • Main tree updated to Xen 4.8.5
    • Shim updated to current upstream stable-4.10 branch, to avoid errors trying to cherry-pick security patches.
  • This includes fixes to:

    XSA-282 CVE-2018-19967 Xen 4.8 and 4.10 shim
    XSA-280 CVE-2018-19966 Xen 4.8 and 4.10 shim
    XSA-279 CVE-2018-19965 Xen 4.8 and 4.10 shim
    XSA-275 CVE-2018-19961 CVE-2018-19962 Xen 4.8 and 4.10 shim
    XSA-278 CVE-2018-18883 Xen 4.10 shim only

  • For completeness, the following fixes are not applicable:

    XSA-274 CVE-2018-14678 Bug is in Linux
    XSA-270 CVE-2018-15471 Bug is in Linux
    XSA-271 CVE-2018-14007 Bug is in XAPI (not in Debian)
    XSA-277 CVE-2018-19964 Bug not in either 4.8 or 4.10
    XSA-276 CVE-2018-19963 Bug not in either 4.8 or 4.10

  • Added CVEs to previous changelog entries:
    1. 8.4+xsa273+shim4.10.1+xsa273-1+deb9u10
    2. 8.3+xsa267+shim4.10.1+xsa267-1+deb9u9
Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Version 4.8.5+shim4.10.2+xsa282-1+deb9u11 introduced

Jan 29
  • Update to new upstream versions:
    • Main tree updated to Xen 4.8.5
    • Shim updated to current upstream stable-4.10 branch, to avoid errors trying to cherry-pick security patches.
  • This includes fixes to:

    XSA-282 CVE-2018-19967 Xen 4.8 and 4.10 shim
    XSA-280 CVE-2018-19966 Xen 4.8 and 4.10 shim
    XSA-279 CVE-2018-19965 Xen 4.8 and 4.10 shim
    XSA-275 CVE-2018-19961 CVE-2018-19962 Xen 4.8 and 4.10 shim
    XSA-278 CVE-2018-18883 Xen 4.10 shim only

  • For completeness, the following fixes are not applicable:

    XSA-274 CVE-2018-14678 Bug is in Linux
    XSA-270 CVE-2018-15471 Bug is in Linux
    XSA-271 CVE-2018-14007 Bug is in XAPI (not in Debian)
    XSA-277 CVE-2018-19964 Bug not in either 4.8 or 4.10
    XSA-276 CVE-2018-19963 Bug not in either 4.8 or 4.10

  • Added CVEs to previous changelog entries:
    1. 8.4+xsa273+shim4.10.1+xsa273-1+deb9u10
    2. 8.3+xsa267+shim4.10.1+xsa267-1+deb9u9
Debian 10.0 icon

Debian 10.0 buster/main: Updated from 4.11.1~pre.20180911.5acdd26fdc+dfsg-5 to 4.11.1-1

Jan 16
  • debian/control: Add Homepage, Vcs-Browser and Vcs-Git.
    (Closes: #911457)
  • grub.d/xen.cfg: fix default entry when using l10n (Closes: #865086)
  • debian/rules: Don't exclude the actual pygrub script.
  • Update to new upstream version 4.11.1, which also contains:
    • Fix: insufficient TLB flushing / improper large page mappings with AMD IOMMUs
      XSA-275 CVE-2018-19961 CVE-2018-19962
    • Fix: resource accounting issues in x86 IOREQ server handling XSA-276 CVE-2018-19963
    • Fix: x86: incorrect error handling for guest p2m page removals XSA-277 CVE-2018-19964
    • Fix: x86: Nested VT-x usable even when disabled
      XSA-278 CVE-2018-18883
    • Fix: x86: DoS from attempting to use INVPCID with a non-canonical addresses
      XSA-279 CVE-2018-19965
    • Fix for XSA-240 conflicts with shadow paging
      XSA-280 CVE-2018-19966
    • Fix: guest use of HLE constructs may lock up host XSA-282 CVE-2018-19967
  • Update version handling patching to put the team mailing list address in the first hypervisor log line and fix broken other substitutions.
  • Disable handle_iptable hook in vif-common script. See #894013 for more information.
MX Linux mx16 icon

MX Linux mx16 mx16/main: Version 4.4.1-9+deb8u7 introduced

Jan 14
  • Non-maintainer upload by the Security Team.
  • CVE-2016-7092: x86: Disallow L3 recursive pagetable for 32-bit PV guests (XSA-185)
  • CVE-2016-7094: x86 HVM: Overflow of sh_ctxt->seg_reg[] (XSA-187)
  • CVE-2016-7154: use after free in FIFO event channel code (XSA-188)
Ubuntu 19.04 icon

Ubuntu 19.04 disco/main: Version 4.9.2-0ubuntu2 introduced

Jan 14
  • No-change rebuild for ncurses soname changes.
Ubuntu 18.10 icon

Ubuntu 18.10 cosmic/main: Version 4.9.2-0ubuntu2 introduced

Jan 14
  • No-change rebuild for ncurses soname changes.
Debian 10.0 icon

Debian 10.0 buster/main: Updated from 4.8.3+comet2+shim4.10.0+comet3-1+deb9u5 to 4.11.1~pre.20180911.5acdd26fdc+dfsg-5

Jan 12
  • debian/rules: Cope if xen-utils-common not being built
    (Fixes binary-indep FTBFS.)
Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Version 4.8.3+xsa262+shim4.10.0+comet3-1+deb9u7 removed

Jan 12
Debian 9.0 icon

Debian 9.0 stretch/main: Updated from 4.8.3+comet2+shim4.10.0+comet3-1+deb9u5 to 4.8.4+xsa273+shim4.10.1+xsa273-1+deb9u10

Jan 12
  • Update to new upstream version 4.8.4+xsa273+shim4.10.1+xsa273.

    XSA-273 (CVE-2018-3620,CVE-2018-3646)
    XSA-272 (no CVE yet)
    XSA-269 (no CVE yet)
    XSA-268 (no CVE yet)

    This version is, again, a combination of staging-4.8 and staging-4.10
    for Xen and shim respectively as in previous versions.

Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Version 4.8.3+xsa262+shim4.10.0+comet3-1+deb9u7 introduced

2018-06-19
Ubuntu 18.04 LTS icon

Ubuntu 18.04 LTS bionic/main: Updated from 4.9.0-0ubuntu3 to 4.9.2-0ubuntu1

2018-06-12
  • Update to upstream 4.9.2 release (LP: #1763354).
    Changes include numerous bugfixes, including security fixes/updates.
    1. 9.0 -> 4.9.1:
    2. XSA-226 / CVE-2017-12135 (replacement)
    3. XSA-227 / CVE-2017-12137 (replacement)
    4. XSA-228 / CVE-2017-12136 (replacement)
    5. XSA-230 / CVE-2017-12855 (replacement)
    6. XSA-231 / CVE-2017-14316 (replacement)
    7. XSA-232 / CVE-2017-14318 (replacement)
    8. XSA-233 / CVE-2017-14317 (replacement)
    9. XSA-234 / CVE-2017-14319 (replacement)
    10. XSA-235 / CVE-2017-15596 (replacement)
    11. XSA-236 / CVE-2017-15597 (new)
    12. XSA-237 / CVE-2017-15590 (replacement)
    13. XSA-238 / CVE-2017-15591 (replacement)
    14. XSA-239 / CVE-2017-15589 (replacement)
    15. XSA-240 / CVE-2017-15595 (update)
    16. XSA-241 / CVE-2017-15588 (replacement)
    17. XSA-242 / CVE-2017-15593 (replacement)
    18. XSA-243 / CVE-2017-15592 (replacement)
    19. XSA-244 / CVE-2017-15594 (replacement)
    20. XSA-245 / CVE-2017-17046 (replacement)
    21. 9.1 -> 4.9.2:
    22. XSA-246 / CVE-2017-17044 (new)
    23. XSA-247 / CVE-2017-17045 (new)
    24. XSA-248 / CVE-2017-17566 (new)
    25. XSA-249 / CVE-2017-17563 (new)
    26. XSA-250 / CVE-2017-17564 (new)
    27. XSA-251 / CVE-2017-17565 (new)
    28. XSA-252 / CVE-2018-7540 (new)
    29. XSA-254 / CVE-2017-5754 (new / XPTI Meltdown mitigation)
    30. XSA-255 / CVE-2018-7541 (new)
    31. XSA-256 / CVE-2018-7542 (new)
  • Dropped:
    d/p/ubuntu/tools-fix-ftbs-arm.patch (upstream)
Debian 10.0 icon

Debian 10.0 buster/main: Updated from 4.8.2+xsa245-0+deb9u1 to 4.8.3+comet2+shim4.10.0+comet3-1+deb9u5

2018-03-14
  • Security fixes from upstream XSAs:

    XSA-252 CVE-2018-7540
    XSA-255 CVE-2018-7541
    XSA-256 CVE-2018-7542

    The upstream BTI changes from XSA-254 (Spectre v2 mitigation) are *not* included. They are currently failing in upstream CI.
  • init scripts: Do not kill per-domain qemu processes. Closes:#879751.
  • Install Meltdown READMEs on all architectures. Closes:#890488.
  • Ship xen-diag (by cherry-picking the appropriate commits from upstream). This can help with diagnosis of #880554.
Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Version 4.8.3+comet2+shim4.10.0+comet3-1+deb9u5 removed

2018-03-14
Debian 9.0 icon

Debian 9.0 stretch/main: Updated from 4.8.2+xsa245-0+deb9u1 to 4.8.3+comet2+shim4.10.0+comet3-1+deb9u5

2018-03-14
  • Security fixes from upstream XSAs:

    XSA-252 CVE-2018-7540
    XSA-255 CVE-2018-7541
    XSA-256 CVE-2018-7542

    The upstream BTI changes from XSA-254 (Spectre v2 mitigation) are *not* included. They are currently failing in upstream CI.
  • init scripts: Do not kill per-domain qemu processes. Closes:#879751.
  • Install Meltdown READMEs on all architectures. Closes:#890488.
  • Ship xen-diag (by cherry-picking the appropriate commits from upstream). This can help with diagnosis of #880554.
Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Updated from 4.8.3+comet2+shim4.10.0+comet3-1+deb9u4.1 to 4.8.3+comet2+shim4.10.0+comet3-1+deb9u5

2018-03-07
  • Security fixes from upstream XSAs:

    XSA-252 CVE-2018-7540
    XSA-255 CVE-2018-7541
    XSA-256 CVE-2018-7542

    The upstream BTI changes from XSA-254 (Spectre v2 mitigation) are *not* included. They are currently failing in upstream CI.
  • init scripts: Do not kill per-domain qemu processes. Closes:#879751.
  • Install Meltdown READMEs on all architectures. Closes:#890488.
  • Ship xen-diag (by cherry-picking the appropriate commits from upstream). This can help with diagnosis of #880554.
Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Version 4.8.3+comet2+shim4.10.0+comet3-1+deb9u4.1 introduced

2018-02-26
  • Fix builds on other than amd64.
⇧ Top