libxenstore3.0_4.1.4-3+deb7u9_amd64.deb


Advertisement

Description

libxenstore3.0 - Xenstore communications library for Xen

Property Value
Distribution Debian 7 (Wheezy)
Repository Debian Main amd64
Package name libxenstore3.0
Package version 4.1.4
Package release 3+deb7u9
Package architecture amd64
Package type deb
Installed size 79 B
Download size 29.60 KB
Official Mirror ftp.br.debian.org
This package contains the public libxenstore.

Alternatives

Package Version Architecture Repository
libxenstore3.0_4.1.6.lts1-14_i386.deb 4.1.6.lts1 i386 Debian Security Updates Main
libxenstore3.0_4.1.6.lts1-14_amd64.deb 4.1.6.lts1 amd64 Debian Security Updates Main
libxenstore3.0_4.1.4-3+deb7u9_i386.deb 4.1.4 i386 Debian Main
libxenstore3.0 - - -

Requires

Name Value
libc6 >= 2.7

Download

Type URL
Binary Package libxenstore3.0_4.1.4-3+deb7u9_amd64.deb
Source Package xen

Install Howto

  1. Update the package index:
    # sudo apt-get update
  2. Install libxenstore3.0 deb package:
    # sudo apt-get install libxenstore3.0

Files

Path
/usr/lib/libxenstore.so.3.0
/usr/lib/libxenstore.so.3.0.0
/usr/share/doc/libxenstore3.0/changelog.Debian.gz
/usr/share/doc/libxenstore3.0/changelog.gz
/usr/share/doc/libxenstore3.0/copyright

Changelog

2015-10-31 - Salvatore Bonaccorso <carnil@debian.org>
xen (4.1.4-3+deb7u9) wheezy-security; urgency=high
* Non-maintainer upload by the Security Team.
* Add CVE-2015-7835-xsa148.patch patch.
CVE-2015-7835: x86: Uncontrolled creation of large page mappings by PV
guests. 
2015-06-12 - Guido Trotter <ultrotter@debian.org>
xen (4.1.4-3+deb7u8) wheezy-security; urgency=low
* Security upload.
* CVE-2015-3209 (XSA 135)
- qemu pcnet emulation fix
* CVE-2015-4164 (XSA 136)
- x86/traps: loop in the correct direction in compat_iret()
* CVE-2015-4103 (XSA 128)
- Potential unintended writes to host MSI message data field via qemu
* CVE-2015-4104 (XSA 129)
- PCI MSI mask bits inadvertently exposed to guests
* CVE-2015-4105 (XSA 130)
- Guest triggerable qemu MSI-X pass-through error messages
* CVE-2015-3340 (XSA 132)
- Information leak through XEN_DOMCTL_gettscinfo
* CVE-2015-4106 (XSA 131)
-  	Unmediated PCI register access in qemu
2015-05-16 - Moritz Muehlenhoff <jmm@debian.org>
xen (4.1.4-3+deb7u6) wheezy-security; urgency=low
* CVE-2015-3456
2015-03-05 - Guido Trotter <ultrotter@debian.org>
xen (4.1.4-3+deb7u5) wheezy-security; urgency=low
* Security upload.
* Apply fix for Xen Security Advisory 121 (CVE-2015-2044)
* Apply fix for Xen Security Advisory 122 (CVE-2015-2045)
* Apply fix for Xen Security Advisory 123 (CVE unknown)
2015-01-21 - Guido Trotter <ultrotter@debian.org>
xen (4.1.4-3+deb7u4) wheezy-security; urgency=low
* Security upload.
* Apply fix for Xen Security Advisory 109 (CVE-2014-8594)
* Apply fix for Xen Security Advisory 110 (CVE-2014-8595)
* Apply fix for Xen Security Advisory 111 (CVE-2014-8866)
* Apply fix for Xen Security Advisory 112 (CVE-2014-8867)
* Apply fix for Xen Security Advisory 113 (CVE-2014-9030)
2014-09-29 - Guido Trotter <ultrotter@debian.org>
xen (4.1.4-3+deb7u3) wheezy-security; urgency=low
* Security upload.
* Apply fix for Xen Security Advisory 108 (CVE-2014-7188)
* Apply fix for Xen Security Advisory 104 (CVE-2014-7154)
* Apply fix for Xen Security Advisory 105 (CVE-2014-7155)
* Apply fix for Xen Security Advisory 106 (CVE-2014-7156)
* Apply fix for Xen Security Advisory 56 (CVE-2013-2072)
2014-08-17 - Guido Trotter <ultrotter@debian.org>
xen (4.1.4-3+deb7u2) wheezy-security; urgency=high
* Security upload.
* Apply fix for Xen Security Advisory 52 (CVE-2013-2076)
* Apply fix for Xen Security Advisory 53 (CVE-2013-2077)
* Apply fix for Xen Security Advisory 54 (CVE-2013-2078)
* Apply fix for Xen Security Advisory 55
(CVE-2013-2194, CVE-2013-2195, CVE-2013-2196)
* Apply fix for Xen Security Advisory 57 (CVE-2013-2211)
* Apply fix for Xen Security Advisory 58 (CVE-2013-1432)
* Apply fix for Xen Security Advisory 61 (CVE-2013-4329)
* Apply fix for Xen Security Advisory 62 (CVE-2013-1442)
* Apply fix for Xen Security Advisory 63 (CVE-2013-4355)
* Apply fix for Xen Security Advisory 66 (CVE-2013-4361)
* Apply fix for Xen Security Advisory 67 (CVE-2013-4368)
* Apply fix for Xen Security Advisory 73 (CVE-2013-4494)
* Apply fix for Xen Security Advisory 74 (CVE-2013-4553)
* Apply fix for Xen Security Advisory 88 (CVE-2014-1950)
* Apply fix for Xen Security Advisory 89 (CVE-2014-2599)
* Apply fix for Xen Security Advisory 92 (CVE-2014-3124)
* Apply fix for Xen Security Advisory 100 (CVE-2014-4021)
2013-05-04 - Salvatore Bonaccorso <carnil@debian.org>
xen (4.1.4-3+deb7u1) wheezy-security; urgency=high
* Non-maintainer upload by the Security Team.
[ Bastian Blank ]
* Make several long runing operations preemptible.
CVE-2013-1918
* Fix source validation for VT-d interrupt remapping.
CVE-2013-1952
2013-04-19 - Bastian Blank <waldi@debian.org>
xen (4.1.4-3) unstable; urgency=high
* Fix return from SYSENTER.
CVE-2013-1917
* Fix various problems with guest interrupt handling.
CVE-2013-1919
* Only save pointer after access checks.
CVE-2013-1920
* Fix domain locking for transitive grants.
CVE-2013-1964

See Also

Package Description
libxerces-c-dev_3.1.1-3+deb7u2_amd64.deb validating XML parser library for C++ (development files)
libxerces-c-doc_3.1.1-3+deb7u2_all.deb validating XML parser library for C++ (documentation)
libxerces-c-samples_3.1.1-3+deb7u2_amd64.deb validating XML parser library for C++ (compiled samples)
libxerces-c2-dev_2.8.0+deb1-3_amd64.deb validating XML parser library for C++ (development files)
libxerces-c2-doc_2.8.0+deb1-3_all.deb validating XML parser library for C++ (documentation)
libxerces-c28_2.8.0+deb1-3_amd64.deb validating XML parser library for C++
libxerces-c3.1_3.1.1-3+deb7u2_amd64.deb validating XML parser library for C++
libxerces2-java-doc_2.11.0-6_all.deb Validating XML parser for Java -- Documentation and examples
libxerces2-java-gcj_2.11.0-6_amd64.deb Validating XML parser for Java with DOM level 3 support (native code)
libxerces2-java_2.11.0-6_all.deb Validating XML parser for Java with DOM level 3 support
libxext-dev_1.3.1-2+deb7u1_amd64.deb X11 miscellaneous extensions library (development headers)
libxext-doc_1.3.1-2+deb7u1_all.deb X11 miscellaneous extensions library (documentation)
libxext6_1.3.1-2+deb7u1_amd64.deb X11 miscellaneous extension library
libxfce4menu-0.1-0_4.6.2-1_amd64.deb freedesktop.org compliant menu implementation for Xfce
libxfce4menu-0.1-dev_4.6.2-1_amd64.deb Development files for libxfce4menu
Advertisement
Advertisement