Package "libxenstore3.0"

Name: libxenstore3.0


Xenstore communications library for Xen

Latest version: 4.4.0-0ubuntu5
Release: trusty (14.04)
Level: base
Repository: main
Head package: xen


Download "libxenstore3.0"

Other versions of "libxenstore3.0" in Trusty

Repository Area Version
security main 4.4.2-0ubuntu0.14.04.14
updates main 4.4.2-0ubuntu0.14.04.14


Version: 4.4.0-0ubuntu5 2014-04-14 20:07:21 UTC

  xen (4.4.0-0ubuntu5) trusty; urgency=low

  * Minimal changes to make arm64 build. It produces packages, whatever
    can be done with those is somebody elses problem.
 -- Stefan Bader <email address hidden> Fri, 11 Apr 2014 15:12:47 +0200

Source diff to previous version

Version: 4.4.0-0ubuntu4 2014-04-10 22:07:02 UTC

  xen (4.4.0-0ubuntu4) trusty; urgency=low

  * Fix up some more stale 4.3 references in xen-utils-4.4 debian
    packaging files.
  * Remove update-alternatives for postinst and prerm of xen-utils-<version>
    as there is no xen-default anymore.
  * debian/rules.real:
    Add etc/default/grub.d and install xen.cfg into it. This adds a
    place to set Xen grub arguments and makes booting into Xen the
    default (with a warning message on running update-grub).
  * debian/rules.real, debian/xen-utils-$(VERSION).postinst, xen-sxp2xm,
    and xen-migrate-xend-managed-domains:
    Add migration scripts to the xen-utils-$(VERSION) package
    (LP: #1303886).
  * Add transitional packages for migrating xen-hypervisor-4.1-(i386|amd64)
    and xen-hypervisor-4.3-amd64 to add the xen-system-amd64 meta-package
    which is the preferred/recommeded way of installing Xen now.
 -- Stefan Bader <email address hidden> Wed, 26 Mar 2014 19:25:53 +0100

Source diff to previous version
1303886 [Trusty] Xend managed domains disappear after upgrade

Version: 4.4.0-0ubuntu3 2014-03-21 14:07:45 UTC

  xen (4.4.0-0ubuntu3) trusty; urgency=low

  * Fixing up changelog history and preparing for FFE (LP: #1290743).

Source diff to previous version
1290743 [FFE] Pull Xen-4.4 into Trusty

Version: 4.3.0-1ubuntu5 2014-02-19 20:07:45 UTC

  xen (4.3.0-1ubuntu5) trusty; urgency=low

  * Applying Xen Security Advisories:
    - CVE-2014-1642 / XSA-83
      * x86/irq: avoid use-after-free on error path in pirq_guest_bind()
    - CVE-2014-1891 / XSA-84
      * flask: fix reading strings from guest memory
    - CVE-2014-1895 / XSA-85
      * xsm/flask: correct off-by-one in flask_security_avc_cachestats
        cpu id check
    - CVE-2014-1896 / XSA-86
      * libvchan: Fix handling of invalid ring buffer indices
    - CVE-2014-1666 / XSA-87
      * x86: PHYSDEVOP_{prepare,release}_msix are privileged
    - CVE-2014-1950 / XSA-88
      * libxc: Fix out-of-memory error handling in xc_cpupool_getinfo()
 -- Stefan Bader <email address hidden> Mon, 17 Feb 2014 13:54:15 +0100

CVE-2014-1642 The IRQ setup in Xen 4.2.x and 4.3.x, when using device passthrough ...
CVE-2014-1891 XSA-84
CVE-2014-1895 XSA-85 Off-by-one error in FLASK_AVC_CACHESTAT hypercall
CVE-2014-1896 XSA-86 libvchan failure handling malicious ring indexes
CVE-2014-1666 The do_physdev_op function in Xen 4.1.5,, 4.2.2 through 4.2.3, ...
CVE-2014-1950 XSA-88

About   -   Send Feedback to @ubuntu_updates