libxen-ocaml-dev_4.1.4-3+deb7u9_amd64.deb


Advertisement

Description

libxen-ocaml-dev - OCaml libraries for controlling Xen (devel package)

Property Value
Distribution Debian 7 (Wheezy)
Repository Debian Main amd64
Package name libxen-ocaml-dev
Package version 4.1.4
Package release 3+deb7u9
Package architecture amd64
Package type deb
Installed size 360 B
Download size 87.70 KB
Official Mirror ftp.br.debian.org
This package contains the ocaml findlib packages for compiling
applications that are designed to control the Xen hypervisor.

Alternatives

Package Version Architecture Repository
libxen-ocaml-dev_4.1.6.lts1-14_i386.deb 4.1.6.lts1 i386 Debian Security Updates Main
libxen-ocaml-dev_4.1.6.lts1-14_amd64.deb 4.1.6.lts1 amd64 Debian Security Updates Main
libxen-ocaml-dev_4.1.4-3+deb7u9_i386.deb 4.1.4 i386 Debian Main
libxen-ocaml-dev - - -

Requires

Name Value
libxen-dev = 4.1.4-3+deb7u9
libxen-ocaml = 4.1.4-3+deb7u9
ocaml-nox-3.12.1 -

Provides

Name Value
libxen-ocaml-dev-3xk69 -

Download

Type URL
Binary Package libxen-ocaml-dev_4.1.4-3+deb7u9_amd64.deb
Source Package xen

Install Howto

  1. Update the package index:
    # sudo apt-get update
  2. Install libxen-ocaml-dev deb package:
    # sudo apt-get install libxen-ocaml-dev

Files

Path
/usr/lib/ocaml/xenbus/libxenbus_stubs.a
/usr/lib/ocaml/xenbus/xenbus.a
/usr/lib/ocaml/xenbus/xenbus.cmi
/usr/lib/ocaml/xenbus/xenbus.cmx
/usr/lib/ocaml/xenbus/xenbus.cmxa
/usr/lib/ocaml/xenctrl/libxenctrl_stubs.a
/usr/lib/ocaml/xenctrl/xenctrl.a
/usr/lib/ocaml/xenctrl/xenctrl.cmi
/usr/lib/ocaml/xenctrl/xenctrl.cmx
/usr/lib/ocaml/xenctrl/xenctrl.cmxa
/usr/lib/ocaml/xeneventchn/libxeneventchn_stubs.a
/usr/lib/ocaml/xeneventchn/xeneventchn.a
/usr/lib/ocaml/xeneventchn/xeneventchn.cmi
/usr/lib/ocaml/xeneventchn/xeneventchn.cmx
/usr/lib/ocaml/xeneventchn/xeneventchn.cmxa
/usr/lib/ocaml/xenlight/libxenlight_stubs.a
/usr/lib/ocaml/xenlight/xenlight.a
/usr/lib/ocaml/xenlight/xenlight.cmi
/usr/lib/ocaml/xenlight/xenlight.cmx
/usr/lib/ocaml/xenlight/xenlight.cmxa
/usr/lib/ocaml/xenmmap/libxenmmap_stubs.a
/usr/lib/ocaml/xenmmap/xenmmap.a
/usr/lib/ocaml/xenmmap/xenmmap.cmi
/usr/lib/ocaml/xenmmap/xenmmap.cmx
/usr/lib/ocaml/xenmmap/xenmmap.cmxa
/usr/lib/ocaml/xenstore/xenstore.a
/usr/lib/ocaml/xenstore/xenstore.cmi
/usr/lib/ocaml/xenstore/xenstore.cmx
/usr/lib/ocaml/xenstore/xenstore.cmxa
/usr/share/doc/libxen-ocaml-dev/changelog.Debian.gz
/usr/share/doc/libxen-ocaml-dev/changelog.gz
/usr/share/doc/libxen-ocaml-dev/copyright
/var/lib/ocaml/lintian/libxen-ocaml-dev.info
/var/lib/ocaml/md5sums/libxen-ocaml-dev.md5sums

Changelog

2015-10-31 - Salvatore Bonaccorso <carnil@debian.org>
xen (4.1.4-3+deb7u9) wheezy-security; urgency=high
* Non-maintainer upload by the Security Team.
* Add CVE-2015-7835-xsa148.patch patch.
CVE-2015-7835: x86: Uncontrolled creation of large page mappings by PV
guests. 
2015-06-12 - Guido Trotter <ultrotter@debian.org>
xen (4.1.4-3+deb7u8) wheezy-security; urgency=low
* Security upload.
* CVE-2015-3209 (XSA 135)
- qemu pcnet emulation fix
* CVE-2015-4164 (XSA 136)
- x86/traps: loop in the correct direction in compat_iret()
* CVE-2015-4103 (XSA 128)
- Potential unintended writes to host MSI message data field via qemu
* CVE-2015-4104 (XSA 129)
- PCI MSI mask bits inadvertently exposed to guests
* CVE-2015-4105 (XSA 130)
- Guest triggerable qemu MSI-X pass-through error messages
* CVE-2015-3340 (XSA 132)
- Information leak through XEN_DOMCTL_gettscinfo
* CVE-2015-4106 (XSA 131)
-  	Unmediated PCI register access in qemu
2015-05-16 - Moritz Muehlenhoff <jmm@debian.org>
xen (4.1.4-3+deb7u6) wheezy-security; urgency=low
* CVE-2015-3456
2015-03-05 - Guido Trotter <ultrotter@debian.org>
xen (4.1.4-3+deb7u5) wheezy-security; urgency=low
* Security upload.
* Apply fix for Xen Security Advisory 121 (CVE-2015-2044)
* Apply fix for Xen Security Advisory 122 (CVE-2015-2045)
* Apply fix for Xen Security Advisory 123 (CVE unknown)
2015-01-21 - Guido Trotter <ultrotter@debian.org>
xen (4.1.4-3+deb7u4) wheezy-security; urgency=low
* Security upload.
* Apply fix for Xen Security Advisory 109 (CVE-2014-8594)
* Apply fix for Xen Security Advisory 110 (CVE-2014-8595)
* Apply fix for Xen Security Advisory 111 (CVE-2014-8866)
* Apply fix for Xen Security Advisory 112 (CVE-2014-8867)
* Apply fix for Xen Security Advisory 113 (CVE-2014-9030)
2014-09-29 - Guido Trotter <ultrotter@debian.org>
xen (4.1.4-3+deb7u3) wheezy-security; urgency=low
* Security upload.
* Apply fix for Xen Security Advisory 108 (CVE-2014-7188)
* Apply fix for Xen Security Advisory 104 (CVE-2014-7154)
* Apply fix for Xen Security Advisory 105 (CVE-2014-7155)
* Apply fix for Xen Security Advisory 106 (CVE-2014-7156)
* Apply fix for Xen Security Advisory 56 (CVE-2013-2072)
2014-08-17 - Guido Trotter <ultrotter@debian.org>
xen (4.1.4-3+deb7u2) wheezy-security; urgency=high
* Security upload.
* Apply fix for Xen Security Advisory 52 (CVE-2013-2076)
* Apply fix for Xen Security Advisory 53 (CVE-2013-2077)
* Apply fix for Xen Security Advisory 54 (CVE-2013-2078)
* Apply fix for Xen Security Advisory 55
(CVE-2013-2194, CVE-2013-2195, CVE-2013-2196)
* Apply fix for Xen Security Advisory 57 (CVE-2013-2211)
* Apply fix for Xen Security Advisory 58 (CVE-2013-1432)
* Apply fix for Xen Security Advisory 61 (CVE-2013-4329)
* Apply fix for Xen Security Advisory 62 (CVE-2013-1442)
* Apply fix for Xen Security Advisory 63 (CVE-2013-4355)
* Apply fix for Xen Security Advisory 66 (CVE-2013-4361)
* Apply fix for Xen Security Advisory 67 (CVE-2013-4368)
* Apply fix for Xen Security Advisory 73 (CVE-2013-4494)
* Apply fix for Xen Security Advisory 74 (CVE-2013-4553)
* Apply fix for Xen Security Advisory 88 (CVE-2014-1950)
* Apply fix for Xen Security Advisory 89 (CVE-2014-2599)
* Apply fix for Xen Security Advisory 92 (CVE-2014-3124)
* Apply fix for Xen Security Advisory 100 (CVE-2014-4021)
2013-05-04 - Salvatore Bonaccorso <carnil@debian.org>
xen (4.1.4-3+deb7u1) wheezy-security; urgency=high
* Non-maintainer upload by the Security Team.
[ Bastian Blank ]
* Make several long runing operations preemptible.
CVE-2013-1918
* Fix source validation for VT-d interrupt remapping.
CVE-2013-1952
2013-04-19 - Bastian Blank <waldi@debian.org>
xen (4.1.4-3) unstable; urgency=high
* Fix return from SYSENTER.
CVE-2013-1917
* Fix various problems with guest interrupt handling.
CVE-2013-1919
* Only save pointer after access checks.
CVE-2013-1920
* Fix domain locking for transitive grants.
CVE-2013-1964

See Also

Package Description
libxen-ocaml_4.1.4-3+deb7u9_amd64.deb OCaml libraries for controlling Xen
libxenapi-ocaml-dev_1.3.2-15_amd64.deb Xen Cloud Platform - OCaml bindings
libxenomai-dev_2.6.0-2_amd64.deb Headers and static libs for Xenomai
libxenomai1_2.6.0-2_amd64.deb Shared libraries for Xenomai
libxenstore3.0_4.1.4-3+deb7u9_amd64.deb Xenstore communications library for Xen
libxerces-c-dev_3.1.1-3+deb7u2_amd64.deb validating XML parser library for C++ (development files)
libxerces-c-doc_3.1.1-3+deb7u2_all.deb validating XML parser library for C++ (documentation)
libxerces-c-samples_3.1.1-3+deb7u2_amd64.deb validating XML parser library for C++ (compiled samples)
libxerces-c2-dev_2.8.0+deb1-3_amd64.deb validating XML parser library for C++ (development files)
libxerces-c2-doc_2.8.0+deb1-3_all.deb validating XML parser library for C++ (documentation)
libxerces-c28_2.8.0+deb1-3_amd64.deb validating XML parser library for C++
libxerces-c3.1_3.1.1-3+deb7u2_amd64.deb validating XML parser library for C++
libxerces2-java-doc_2.11.0-6_all.deb Validating XML parser for Java -- Documentation and examples
libxerces2-java-gcj_2.11.0-6_amd64.deb Validating XML parser for Java with DOM level 3 support (native code)
libxerces2-java_2.11.0-6_all.deb Validating XML parser for Java with DOM level 3 support
Advertisement
Advertisement