xen vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the xen package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Use After Free

<4.7.3-r2
  • M
Improper Check for Unusual or Exceptional Conditions

<4.7.3-r2
  • M
Information Exposure

<4.7.3-r4
  • M
Improper Input Validation

<4.7.3-r3
  • M
Information Exposure

<4.7.3-r3
  • M
Resource Exhaustion

<4.7.3-r3
  • M
Improper Input Validation

<4.7.3-r5
  • H
Error Handling

<4.7.3-r5
  • H
Out-of-Bounds

<4.7.3-r5
  • H
CVE-2017-17566

<4.7.3-r5
  • H
Incorrect Calculation

<4.7.2-r1
  • H
Out-of-bounds Read

<4.7.2-r2
  • M
NULL Pointer Dereference

<4.7.2-r2
  • M
Race Condition

<4.7.2-r2
  • H
CVE-2017-14319

<4.7.2-r2
  • H
CVE-2017-8903

<4.7.2-r1
  • M
Information Exposure

<4.7.6-r0
  • H
CVE-2017-8904

<4.7.2-r1
  • M
CVE-2018-12893

<4.7.6-r0
  • C
Information Exposure

<4.7.6-r0
  • M
Information Exposure

<4.7.6-r0
  • H
Access Restriction Bypass

<4.7.1-r1
  • H
Access Restriction Bypass

<4.7.1-r1
  • M
Improper Input Validation

<4.7.1-r1
  • M
Information Exposure

<4.7.1-r1
  • H
Improper Input Validation

<4.7.1-r1
  • M
Incorrect Calculation

<4.7.1-r1
  • M
Improper Access Control

<4.7.1-r1
  • H
Race Condition

<4.7.1-r1
  • H
Improper Input Validation

<4.7.1-r1
  • H
Improper Access Control

<4.7.0-r0
  • H
CVE-2017-15590

<4.7.3-r3
  • H
Improper Input Validation

<4.7.1-r1
  • M
Improper Input Validation

<4.7.0-r0
  • L
Information Exposure

<4.7.1-r3
  • M
Resource Exhaustion

<4.7.0-r0
  • M
Information Exposure

<4.7.3-r3
  • M
Improper Access Control

<4.7.1-r3
  • H
Resource Exhaustion

<4.7.3-r3
  • M
Improper Access Control

<4.7.1-r3
  • H
Race Condition

<4.7.3-r3
  • M
Improper Access Control

<4.7.1-r3
  • M
Missing Release of Resource after Effective Lifetime

<4.7.3-r3
  • M
Improper Access Control

<4.7.1-r3
  • H
Exposure of Resource to Wrong Sphere

<4.7.3-r3
  • M
Race Condition

<4.7.0-r5
  • H
CVE-2017-15594

<4.7.3-r3
  • C
Out-of-Bounds

<4.7.3-r3
  • C
Out-of-Bounds

<4.7.2-r0
  • H
Improper Validation of Array Index

<4.7.2-r0
  • M
Resource Exhaustion

<4.7.3-r7
  • M
Improper Input Validation

<4.7.1-r4
  • H
CVE-2018-7541

<4.7.3-r7
  • M
NULL Pointer Dereference

<4.7.1-r4
  • H
Access Restriction Bypass

<4.7.1-r4
  • C
Out-of-bounds Read

<4.7.1-r5
  • C
Out-of-bounds Read

<4.7.1-r5
  • M
Information Exposure

<4.7.3-r9
  • M
Out-of-bounds Write

<4.7.3-r9
  • M
Information Exposure

<4.7.3-r0
  • C
CVE-2017-10912

<4.7.3-r0
  • C
CVE-2017-10913

<4.7.3-r0
  • H
Race Condition

<4.7.3-r0
  • C
Race Condition

<4.7.3-r0
  • H
Information Exposure

<4.7.3-r0
  • C
NULL Pointer Dereference

<4.7.3-r0
  • C
Improper Input Validation

<4.7.3-r0
  • M
CVE-2017-10919

<4.7.3-r0
  • C
Out-of-Bounds

<4.7.3-r0
  • C
Out-of-Bounds

<4.7.3-r0
  • H
Resource Exhaustion

<4.7.3-r0
  • M
Improper Input Validation

<4.7.3-r0
  • H
Race Condition

<4.7.3-r9
  • H
CVE-2018-10982

<4.7.3-r9
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<4.7.3-r9
  • H
Incorrect Calculation

<4.7.3-r0
  • H
Buffer Overflow

<4.7.3-r0
  • H
Race Condition

<4.7.3-r0
  • M
Information Exposure

<4.7.3-r0
  • H
Access Restriction Bypass

<4.7.0-r1
  • H
Access Restriction Bypass

<4.7.0-r1
  • M
Out-of-Bounds

<4.7.0-r1
  • M
CVE-2018-12891

<4.7.6-r0
  • L
XSA-207

<4.7.1-r5
  • L
XSA-210

<4.7.1-r5
  • M
Information Exposure

<4.7.3-r4
  • M
Information Exposure

<4.7.3-r4