Linux repositories inspector

xen-utils-common - Xen administrative tools - common files

The userspace tools to manage a system virtualized through the Xen virtual machine monitor.
This package is only required on the host system (Domain 0) and not on the virtual guest systems (Domain U).
Original maintainer
Homepagehttps://xenproject.org/
4.11.1
Debian iconDebian 10.0
4.9.2
Ubuntu iconUbuntu 18.04 LTS
Ubuntu iconUbuntu 18.10
Ubuntu iconUbuntu 19.04
4.9.0
Ubuntu iconUbuntu 17.10
4.8.4
Debian iconDebian 9.0
4.6.5
Ubuntu iconUbuntu 16.04 LTS
4.6.0
Ubuntu iconUbuntu 16.04 LTS
4.4.1
MX Linux iconMX Linux mx16
DistributionVersionSincePackageInstalledPackager
Debian iconDebian 10.0 buster/maindeb4.11.1-116.01.2019263 kiB655 kiB
Debian iconDebian 9.0 stretch/maindeb4.8.4+xsa273+shim4.10.1+xsa273-1+deb9u1012.01.2019280 kiB497 kiB
MX Linux iconMX Linux mx16 mx16/maindeb4.4.1-914.01.2019118 kiB195 kiB
Ubuntu iconUbuntu 17.10 artful/universedeb4.9.0-0ubuntu310.11.2017246 kiB479 kiB
Ubuntu iconUbuntu 18.04 LTS bionic/universedeb4.9.2-0ubuntu119.06.2018247 kiB484 kiB
Ubuntu iconUbuntu 18.10 cosmic/universedeb4.9.2-0ubuntu214.01.2019247 kiB484 kiB
Ubuntu iconUbuntu 19.04 disco/universedeb4.9.2-0ubuntu214.01.2019247 kiB484 kiB
Ubuntu iconUbuntu 16.04 LTS xenial/universedeb4.6.0-1ubuntu410.11.2017214 kiB429 kiB
Ubuntu iconUbuntu 16.04 LTS xenial-security/universedeb4.6.5-0ubuntu1.410.11.2017218 kiB435 kiB
Ubuntu iconUbuntu 16.04 LTS xenial-updates/universedeb4.6.5-0ubuntu1.410.11.2017218 kiB435 kiB

Manual pages

xenstore(1)

xenstore - interact with Xenstore

xenstore-chmod(1)

xenstore-chmod - set the permissions of a Xenstore key

xenstore-ls(1)

xenstore-ls - list Xenstore keys and values

xentop(1)

xentop - displays real-time information about a Xen system and domains

xentrace_format(1)

xentrace_format - pretty-print Xen trace data

xl(1)

xl - Xen management tool, based on LibXenlight

xm(1)

xm - Obsolete xen management user interface

xend-config.sxp(5)

xend-config.sxp - Xen daemon configuration file

xl-disk-configuration(5)

xl-disk-configuration - XL Disk Configuration Syntax

xl-network-configuration(5)

xl-network-configuration - XL Network Configuration Syntax

xl.cfg(5)

xl.cfg - xl domain configuration file syntax

xl.conf(5)

/etc/xen/xl.conf - XL Global/Host Configuration

xlcpupool.cfg(5)

xlcpupool.cfg - XL Cpupool Configuration File Syntax

xmdomain.cfg(5)

xmdomain.cfg - xm domain config file format

xen-pci-device-reservations(7)

xen-pci-device-reservations - Xen PCI device ID registry

xen-pv-channel(7)

xen-pv-channel - Xen PV Channels

xen-tscmode(7)

xen-tscmode - Xen TSC (time stamp counter) and timekeeping discussion

xen-vtpm(7)

xen-vtpm - Xen virtual Trusted Platform Module (vTPM) subsystem

xen-vtpmmgr(7)

xen-vtpmgr - Xen virtual TPM stubdomain

xl-numa-placement(7)

xl-numa-placement - Guest Automatic NUMA Placement in libxl and xl

xentrace(8)

xentrace - capture Xen trace buffer data

Latest updates

Debian 10.0 icon

Debian 10.0 buster/main: Updated from 4.11.1~pre.20180911.5acdd26fdc+dfsg-5 to 4.11.1-1

16.01.2019 11:20
  • debian/control: Add Homepage, Vcs-Browser and Vcs-Git.
    (Closes: #911457)
  • grub.d/xen.cfg: fix default entry when using l10n (Closes: #865086)
  • debian/rules: Don't exclude the actual pygrub script.
  • Update to new upstream version 4.11.1, which also contains:
    • Fix: insufficient TLB flushing / improper large page mappings with AMD IOMMUs
      XSA-275 CVE-2018-19961 CVE-2018-19962
    • Fix: resource accounting issues in x86 IOREQ server handling XSA-276 CVE-2018-19963
    • Fix: x86: incorrect error handling for guest p2m page removals XSA-277 CVE-2018-19964
    • Fix: x86: Nested VT-x usable even when disabled
      XSA-278 CVE-2018-18883
    • Fix: x86: DoS from attempting to use INVPCID with a non-canonical addresses
      XSA-279 CVE-2018-19965
    • Fix for XSA-240 conflicts with shadow paging
      XSA-280 CVE-2018-19966
    • Fix: guest use of HLE constructs may lock up host XSA-282 CVE-2018-19967
  • Update version handling patching to put the team mailing list address in the first hypervisor log line and fix broken other substitutions.
  • Disable handle_iptable hook in vif-common script. See #894013 for more information.
MX Linux mx16 icon

MX Linux mx16 mx16/main: Version 4.4.1-9 introduced

14.01.2019 15:00
  • Explicitly disable graphics for qemu. (closes: #780975) CVE-2015-2152
  • Update fix for insufficient permissions checks on arm. CVE-2014-3969
  • Break apart long latenty MMIO operations. (closes: #781620) CVE-2015-2752
  • Disallow certain domain control operations. (closes: #781620) CVE-2015-2751
Ubuntu 19.04 icon

Ubuntu 19.04 disco/universe: Version 4.9.2-0ubuntu2 introduced

14.01.2019 13:12
  • No-change rebuild for ncurses soname changes.
Ubuntu 18.10 icon

Ubuntu 18.10 cosmic/universe: Version 4.9.2-0ubuntu2 introduced

14.01.2019 03:15
  • No-change rebuild for ncurses soname changes.
Debian 10.0 icon

Debian 10.0 buster/main: Updated from 4.8.3+comet2+shim4.10.0+comet3-1+deb9u5 to 4.11.1~pre.20180911.5acdd26fdc+dfsg-5

12.01.2019 14:14
  • debian/rules: Cope if xen-utils-common not being built
    (Fixes binary-indep FTBFS.)
Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Version 4.8.3+xsa262+shim4.10.0+comet3-1+deb9u7 removed

12.01.2019 13:52
Debian 9.0 icon

Debian 9.0 stretch/main: Updated from 4.8.3+comet2+shim4.10.0+comet3-1+deb9u5 to 4.8.4+xsa273+shim4.10.1+xsa273-1+deb9u10

12.01.2019 13:50
  • Update to new upstream version 4.8.4+xsa273+shim4.10.1+xsa273.

    XSA-273 (CVE-2018-3620,CVE-2018-3646)
    XSA-272 (no CVE yet)
    XSA-269 (no CVE yet)
    XSA-268 (no CVE yet)

    This version is, again, a combination of staging-4.8 and staging-4.10
    for Xen and shim respectively as in previous versions.

Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Version 4.8.3+xsa262+shim4.10.0+comet3-1+deb9u7 introduced

19.06.2018 07:50
Ubuntu 18.04 LTS icon

Ubuntu 18.04 LTS bionic/universe: Updated from 4.9.0-0ubuntu3 to 4.9.2-0ubuntu1

19.06.2018 07:49
  • Update to upstream 4.9.2 release (LP: #1763354).
    Changes include numerous bugfixes, including security fixes/updates.
    1. 9.0 -> 4.9.1:
    2. XSA-226 / CVE-2017-12135 (replacement)
    3. XSA-227 / CVE-2017-12137 (replacement)
    4. XSA-228 / CVE-2017-12136 (replacement)
    5. XSA-230 / CVE-2017-12855 (replacement)
    6. XSA-231 / CVE-2017-14316 (replacement)
    7. XSA-232 / CVE-2017-14318 (replacement)
    8. XSA-233 / CVE-2017-14317 (replacement)
    9. XSA-234 / CVE-2017-14319 (replacement)
    10. XSA-235 / CVE-2017-15596 (replacement)
    11. XSA-236 / CVE-2017-15597 (new)
    12. XSA-237 / CVE-2017-15590 (replacement)
    13. XSA-238 / CVE-2017-15591 (replacement)
    14. XSA-239 / CVE-2017-15589 (replacement)
    15. XSA-240 / CVE-2017-15595 (update)
    16. XSA-241 / CVE-2017-15588 (replacement)
    17. XSA-242 / CVE-2017-15593 (replacement)
    18. XSA-243 / CVE-2017-15592 (replacement)
    19. XSA-244 / CVE-2017-15594 (replacement)
    20. XSA-245 / CVE-2017-17046 (replacement)
    21. 9.1 -> 4.9.2:
    22. XSA-246 / CVE-2017-17044 (new)
    23. XSA-247 / CVE-2017-17045 (new)
    24. XSA-248 / CVE-2017-17566 (new)
    25. XSA-249 / CVE-2017-17563 (new)
    26. XSA-250 / CVE-2017-17564 (new)
    27. XSA-251 / CVE-2017-17565 (new)
    28. XSA-252 / CVE-2018-7540 (new)
    29. XSA-254 / CVE-2017-5754 (new / XPTI Meltdown mitigation)
    30. XSA-255 / CVE-2018-7541 (new)
    31. XSA-256 / CVE-2018-7542 (new)
  • Dropped:
    d/p/ubuntu/tools-fix-ftbs-arm.patch (upstream)
Debian 10.0 icon

Debian 10.0 buster/main: Updated from 4.8.2+xsa245-0+deb9u1 to 4.8.3+comet2+shim4.10.0+comet3-1+deb9u5

14.03.2018 02:50
  • Security fixes from upstream XSAs:

    XSA-252 CVE-2018-7540
    XSA-255 CVE-2018-7541
    XSA-256 CVE-2018-7542

    The upstream BTI changes from XSA-254 (Spectre v2 mitigation) are *not* included. They are currently failing in upstream CI.
  • init scripts: Do not kill per-domain qemu processes. Closes:#879751.
  • Install Meltdown READMEs on all architectures. Closes:#890488.
  • Ship xen-diag (by cherry-picking the appropriate commits from upstream). This can help with diagnosis of #880554.
Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Version 4.8.3+comet2+shim4.10.0+comet3-1+deb9u5 removed

14.03.2018 02:47
Debian 9.0 icon

Debian 9.0 stretch/main: Updated from 4.8.2+xsa245-0+deb9u1 to 4.8.3+comet2+shim4.10.0+comet3-1+deb9u5

14.03.2018 02:46
  • Security fixes from upstream XSAs:

    XSA-252 CVE-2018-7540
    XSA-255 CVE-2018-7541
    XSA-256 CVE-2018-7542

    The upstream BTI changes from XSA-254 (Spectre v2 mitigation) are *not* included. They are currently failing in upstream CI.
  • init scripts: Do not kill per-domain qemu processes. Closes:#879751.
  • Install Meltdown READMEs on all architectures. Closes:#890488.
  • Ship xen-diag (by cherry-picking the appropriate commits from upstream). This can help with diagnosis of #880554.
Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Updated from 4.8.3+comet2+shim4.10.0+comet3-1+deb9u4.1 to 4.8.3+comet2+shim4.10.0+comet3-1+deb9u5

07.03.2018 04:26
  • Security fixes from upstream XSAs:

    XSA-252 CVE-2018-7540
    XSA-255 CVE-2018-7541
    XSA-256 CVE-2018-7542

    The upstream BTI changes from XSA-254 (Spectre v2 mitigation) are *not* included. They are currently failing in upstream CI.
  • init scripts: Do not kill per-domain qemu processes. Closes:#879751.
  • Install Meltdown READMEs on all architectures. Closes:#890488.
  • Ship xen-diag (by cherry-picking the appropriate commits from upstream). This can help with diagnosis of #880554.
Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Version 4.8.3+comet2+shim4.10.0+comet3-1+deb9u4.1 introduced

26.02.2018 04:22
  • Fix builds on other than amd64.
Debian 10.0 icon

Debian 10.0 buster/main: Updated from 4.8.1-1+deb9u3 to 4.8.2+xsa245-0+deb9u1

10.12.2017 22:37
  • Update to upstream stable 4.8 branch, which is currently at Xen 4.8.2 plus a number of bugfixes and security fixes.
    Result is that we now include security fixes for:

    XSA-231 CVE-2017-14316
    XSA-232 CVE-2017-14318
    XSA-233 CVE-2017-14317
    XSA-234 CVE-2017-14319
    (235 already included in 4.8.1-1+deb9u3)
    XSA-236 CVE-2017-15597
    XSA-237 CVE-2017-15590
    XSA-238 (no CVE yet)
    XSA-239 CVE-2017-15589
    XSA-240 CVE-2017-15595
    XSA-241 CVE-2017-15588
    XSA-242 CVE-2017-15593
    XSA-243 CVE-2017-15592
    XSA-244 CVE-2017-15594
    XSA-245 (no CVE yet)

    and a number of upstream functionality fixes, which are not easily disentangled from the security fixes.
  • Apply two more security fixes:

    XSA-246 (no CVE yet)
    XSA-247 (no CVE yet)

Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Version 4.8.2+xsa245-0+deb9u1 removed

09.12.2017 06:35
Debian 9.0 icon

Debian 9.0 stretch/main: Updated from 4.8.1-1+deb9u3 to 4.8.2+xsa245-0+deb9u1

09.12.2017 05:58
  • Update to upstream stable 4.8 branch, which is currently at Xen 4.8.2 plus a number of bugfixes and security fixes.
    Result is that we now include security fixes for:

    XSA-231 CVE-2017-14316
    XSA-232 CVE-2017-14318
    XSA-233 CVE-2017-14317
    XSA-234 CVE-2017-14319
    (235 already included in 4.8.1-1+deb9u3)
    XSA-236 CVE-2017-15597
    XSA-237 CVE-2017-15590
    XSA-238 (no CVE yet)
    XSA-239 CVE-2017-15589
    XSA-240 CVE-2017-15595
    XSA-241 CVE-2017-15588
    XSA-242 CVE-2017-15593
    XSA-243 CVE-2017-15592
    XSA-244 CVE-2017-15594
    XSA-245 (no CVE yet)

    and a number of upstream functionality fixes, which are not easily disentangled from the security fixes.
  • Apply two more security fixes:

    XSA-246 (no CVE yet)
    XSA-247 (no CVE yet)

Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Version 4.8.2+xsa245-0+deb9u1 introduced

29.11.2017 10:40
  • Update to upstream stable 4.8 branch, which is currently at Xen 4.8.2 plus a number of bugfixes and security fixes.
    Result is that we now include security fixes for:

    XSA-231 CVE-2017-14316
    XSA-232 CVE-2017-14318
    XSA-233 CVE-2017-14317
    XSA-234 CVE-2017-14319
    (235 already included in 4.8.1-1+deb9u3)
    XSA-236 CVE-2017-15597
    XSA-237 CVE-2017-15590
    XSA-238 (no CVE yet)
    XSA-239 CVE-2017-15589
    XSA-240 CVE-2017-15595
    XSA-241 CVE-2017-15588
    XSA-242 CVE-2017-15593
    XSA-243 CVE-2017-15592
    XSA-244 CVE-2017-15594
    XSA-245 (no CVE yet)

    and a number of upstream functionality fixes, which are not easily disentangled from the security fixes.
  • Apply two more security fixes:

    XSA-246 (no CVE yet)
    XSA-247 (no CVE yet)

Debian 10.0 icon

Debian 10.0 buster/main: Version 4.8.1-1+deb9u3 introduced

10.11.2017 09:50
  • Security fixes for

    XSA-226 CVE-2017-12135
    XSA-227 CVE-2017-12137
    XSA-228 CVE-2017-12136
    XSA-230 CVE-2017-12855
    XSA-235 (no CVE yet)

  • Adjust changelog entry for 4.8.1-1+deb9u2 to record
    that XSA-225 fix was indeed included.
  • Security fix for XSA-229 not included as that bug is in Linux, not Xen.
  • Security fixes for XSA-231..234 inc. not inclued as still embargoed.
Debian 9.0 icon

Debian 9.0 stretch/main: Version 4.8.1-1+deb9u3 introduced

10.11.2017 09:38
  • Security fixes for

    XSA-226 CVE-2017-12135
    XSA-227 CVE-2017-12137
    XSA-228 CVE-2017-12136
    XSA-230 CVE-2017-12855
    XSA-235 (no CVE yet)

  • Adjust changelog entry for 4.8.1-1+deb9u2 to record
    that XSA-225 fix was indeed included.
  • Security fix for XSA-229 not included as that bug is in Linux, not Xen.
  • Security fixes for XSA-231..234 inc. not inclued as still embargoed.
⇧ Top