xen vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the xen package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Missing Authorization

*
  • M
Improper Handling of Exceptional Conditions

*
  • M
Information Exposure

*
  • H
Out-of-Bounds

*
  • M
CVE-2020-11742

*
  • H
Improper Input Validation

*
  • H
Memory Leak

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Race Condition

*
  • M
Out-of-Bounds

*
  • H
Incorrect Calculation

*
  • M
Improper Input Validation

*
  • M
CVE-2019-11135

*
  • M
Improper Input Validation

*
  • H
Race Condition

*
  • H
Incorrect Permission Assignment for Critical Resource

*
  • M
Use of Externally-Controlled Format String

*
  • M
OS Command Injection

*
  • H
Off-by-one Error

*
  • C
Improper Privilege Management

*
  • H
Race Condition

<4.4.4lts5-0+deb8u1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • H
Improper Input Validation

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Improper Input Validation

<4.4.4lts5-0+deb8u1
  • H
Race Condition

<4.4.4lts5-0+deb8u1
  • H
Improper Input Validation

*
  • M
Information Exposure

*
  • M
CVE-2019-11091

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • H
Incomplete Cleanup

<4.4.4lts5-0+deb8u1
  • H
Information Exposure

<4.4.4lts5-0+deb8u1
  • M
Improper Input Validation

<4.4.4lts4-0+deb8u1
  • M
CVE-2018-19965

*
  • H
Interpretation Conflict

<4.4.4lts5-0+deb8u1
  • M
Resource Exhaustion

<4.4.4lts4-0+deb8u1
  • M
Resource Exhaustion

<4.4.4lts4-0+deb8u1
  • M
CVE-2018-3646

*
  • M
Information Exposure

*
  • M
CVE-2018-12891

<4.4.4lts4-0+deb8u1
  • M
CVE-2018-12893

<4.4.4lts4-0+deb8u1
  • C
Out-of-bounds Read

<4.4.0-1
  • C
Out-of-Bounds

<4.4.0-1
  • M
Information Exposure

*
  • M
Information Exposure

*
  • H
CVE-2018-10982

<4.4.4lts2-0+deb8u1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<4.4.4lts3-0+deb8u1
  • H
Race Condition

<4.4.4lts4-0+deb8u1
  • M
Information Exposure

<4.4.4lts3-0+deb8u1
  • M
Out-of-bounds Write

<4.4.4lts2-0+deb8u1
  • H
CVE-2018-7541

<4.4.4lts4-0+deb8u1
  • M
Resource Exhaustion

<4.4.4lts4-0+deb8u1
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • H
Out-of-Bounds

<4.4.4lts2-0+deb8u1
  • H
CVE-2017-17566

<4.4.4lts2-0+deb8u1
  • M
Improper Input Validation

<4.4.4lts2-0+deb8u1
  • H
Error Handling

<4.4.4lts2-0+deb8u1
  • M
Information Exposure

<4.4.4lts2-0+deb8u1
  • M
Improper Check for Unusual or Exceptional Conditions

<4.4.4lts3-0+deb8u1
  • H
Use After Free

<4.4.4lts3-0+deb8u1
  • C
Out-of-Bounds

<4.4.4lts2-0+deb8u1
  • M
Resource Exhaustion

<4.4.1-9+deb8u10
  • H
CVE-2017-15594

<4.4.4lts3-0+deb8u1
  • H
CVE-2017-15590

<4.4.4lts2-0+deb8u1
  • H
Exposure of Resource to Wrong Sphere

<4.4.4lts3-0+deb8u1
  • M
Information Exposure

<4.4.4lts2-0+deb8u1
  • H
Resource Exhaustion

<4.4.4lts3-0+deb8u1
  • H
Race Condition

<4.4.4lts2-0+deb8u1
  • M
Missing Release of Resource after Effective Lifetime

<4.4.4lts3-0+deb8u1
  • M
Missing Release of Resource after Effective Lifetime

<4.4.4lts1-0+deb8u1
  • H
Out-of-bounds Read

<4.4.4lts2-0+deb8u1
  • M
Race Condition

<4.4.4lts2-0+deb8u1
  • H
CVE-2017-14319

<4.4.4lts2-0+deb8u1
  • H
Buffer Overflow

<4.4.1-9+deb8u10
  • H
Incorrect Calculation

<4.4.1-9+deb8u10
  • M
Information Exposure

<4.4.1-9+deb8u10
  • C
Out-of-Bounds

<4.4.1-9+deb8u10
  • C
Out-of-Bounds

<4.4.1-9+deb8u10
  • C
CVE-2017-10913

<4.4.1-9+deb8u10
  • C
NULL Pointer Dereference

<4.4.1-9+deb8u10
  • C
Race Condition

<4.4.1-9+deb8u10
  • H
Race Condition

<4.4.1-9+deb8u10
  • C
CVE-2017-10912

<4.4.1-9+deb8u10
  • H
Resource Exhaustion

<4.4.1-9+deb8u10
  • M
CVE-2017-10919

*
  • C
Improper Input Validation

<4.4.1-9+deb8u10
  • H
CVE-2017-8903

<4.4.1-9+deb8u9
  • H
Incorrect Calculation

<4.4.1-9+deb8u9
  • H
CVE-2017-8904

<4.4.1-9+deb8u9
  • L
Information Exposure

<4.3.0-1
  • H
Improper Validation of Array Index

<4.4.1-9+deb8u9
  • M
Improper Access Control

*
  • M
Improper Access Control

*
  • M
Improper Access Control

*
  • M
Improper Access Control

*
  • H
Access Restriction Bypass

<4.4.0-1
  • H
Access Restriction Bypass

<4.4.1-9+deb8u9
  • L
Information Exposure

<4.4.1-9+deb8u9
  • M
Improper Input Validation

<4.4.1-9+deb8u9
  • H
Race Condition

<4.4.0-1
  • H
Improper Input Validation

<4.4.1-9+deb8u8
  • H
Access Restriction Bypass

<4.4.1-9+deb8u8
  • H
Improper Input Validation

<4.4.1-9+deb8u8
  • H
Access Restriction Bypass

<4.4.1-9+deb8u8
  • H
Improper Input Validation

<4.4.1-9+deb8u8
  • M
Improper Input Validation

<4.4.1-9+deb8u8
  • M
Race Condition

<4.4.1-9+deb8u8
  • M
Out-of-Bounds

<4.4.1-9+deb8u7
  • H
Access Restriction Bypass

<4.4.1-9+deb8u7
  • M
Use After Free

<4.4.1-9+deb8u7
  • H
Improper Access Control

<4.4.1-9+deb8u6
  • M
CVE-2016-5242

<4.4.1-9+deb8u6
  • M
Improper Access Control

<4.4.4lts1-0+deb8u1
  • M
Access Restriction Bypass

<4.4.1-9+deb8u6
  • M
Resource Exhaustion

<4.4.0-1
  • H
Access Restriction Bypass

<4.4.1-9+deb8u6
  • M
Integer Overflow or Wraparound

<4.4.0-1
  • H
Out-of-Bounds

<4.4.0-1
  • H
Access Restriction Bypass

<4.4.1-9+deb8u5
  • H
Out-of-Bounds

<4.4.0-1
  • H
Improper Access Control

<4.4.1-9+deb8u4
  • L
Information Exposure

<4.4.1-9+deb8u5
  • L
Information Exposure

<4.4.1-9+deb8u5
  • H
Information Exposure

<4.4.1-9+deb8u4
  • M
CVE-2016-2271

<4.4.1-9+deb8u4
  • M
Improper Input Validation

<4.4.1-9+deb8u4
  • M
Code

<4.4.1-9+deb8u4
  • H
Improper Input Validation

<4.4.1-9+deb8u4
  • H
Resource Management Errors

<4.4.1-9+deb8u4
  • M
Improper Data Handling

<4.4.1-9+deb8u4
  • M
Code

<4.4.1-9+deb8u4
  • H
Security Features

<4.4.1-9+deb8u6
  • M
Security Features

<4.4.1-9+deb8u3
  • M
Resource Management Errors

<4.4.1-9+deb8u3
  • M
Resource Management Errors

<4.4.1-9+deb8u3
  • M
Resource Management Errors

<4.4.1-9+deb8u3
  • M
Out-of-Bounds

<4.4.1-9+deb8u3
  • H
Access Restriction Bypass

<4.4.1-9+deb8u2
  • M
Resource Management Errors

<4.4.1-9+deb8u3
  • M
Resource Management Errors

<4.4.1-9+deb8u3
  • M
Improper Data Handling

<4.4.1-9+deb8u3
  • M
Resource Management Errors

<4.4.1-9+deb8u3
  • M
Code

<4.4.1-9+deb8u3
  • M
Access Restriction Bypass

<4.4.1-9+deb8u3
  • H
Out-of-Bounds

<4.4.0-1
  • H
Out-of-Bounds

<4.4.0-1
  • H
Access Restriction Bypass

<4.4.0-1
  • H
Information Exposure

<4.4.0-1
  • H
Access Restriction Bypass

<4.4.1-9+deb8u3
  • H
Out-of-bounds Write

<4.4.1-9+deb8u1
  • M
CVE-2015-4163

<4.4.1-9+deb8u1
  • M
Resource Management Errors

<4.4.1-9+deb8u1
  • M
Access Restriction Bypass

<4.4.1-9+deb8u1
  • M
Resource Management Errors

<4.4.1-9+deb8u1
  • H
Access Restriction Bypass

<4.4.1-9+deb8u1
  • M
Incorrect Authorization

<4.4.1-9+deb8u1
  • H
Out-of-Bounds

<4.4.0-1
  • L
Information Exposure

<4.4.1-9+deb8u3
  • M
Improper Input Validation

<4.4.1-9
  • M
Code

<4.4.1-9
  • M
Access Restriction Bypass

<4.2.0~rc2-1
  • L
Access Restriction Bypass

<4.4.1-9
  • H
Access Restriction Bypass

<4.4.1-8
  • M
Information Exposure

<4.4.1-8
  • M
Information Exposure

<4.4.1-8
  • M
Resource Management Errors

<4.4.1-7
  • M
Resource Management Errors

<4.4.1-3
  • H
CVE-2015-0361

<4.4.1-7
  • M
Code

<4.4.1-6
  • M
Code

*
  • M
Code

<4.4.1-5
  • M
Code

<4.4.1-5
  • M
Improper Input Validation

<4.4.1-4
  • M
Improper Input Validation

<4.4.1-4
  • L
Code

<4.4.1-4
  • M
Out-of-Bounds

<4.4.1-1
  • M
Access Restriction Bypass

<4.4.1-3
  • H
Resource Management Errors

<4.4.1-3
  • M
Access Restriction Bypass

<4.4.1-3
  • M
Race Condition

<4.4.1-3
  • M
Access Restriction Bypass

<4.4.1-1
  • M
Resource Management Errors

<4.4.1-4
  • M
Resource Management Errors

<4.4.1-4
  • L
Out-of-Bounds

<4.4.1-1
  • M
CVE-2014-3968

<4.4.1-1
  • M
CVE-2014-3967

<4.4.1-1
  • M
Access Restriction Bypass

<4.4.1-1
  • M
Numeric Errors

<4.4.0-1
  • M
Improper Input Validation

<4.4.0-1
  • M
Improper Input Validation

<4.4.1-1
  • H
Out-of-Bounds

<4.4.0-1
  • M
Resource Management Errors

<4.4.0-1
  • H
Access Restriction Bypass

<4.4.0-1
  • M
Resource Management Errors

<4.4.0-1
  • L
Resource Management Errors

<4.2
  • M
Improper Input Validation

<4.1.0-1
  • M
Out-of-Bounds

<4.4.0-1
  • H
Access Restriction Bypass

<4.4.0-1
  • H
Access Restriction Bypass

<4.4.0-1
  • M
Improper Input Validation

<4.4.0-1
  • M
Improper Input Validation

<4.4.0-1
  • L
CVE-2013-4369

<4.4.0-1
  • M
Out-of-Bounds

<4.4.0-1
  • M
Resource Management Errors

<4.4.0-1
  • L
Information Exposure

<4.4.0-1
  • M
Access Restriction Bypass

<4.4.0-1
  • H
Buffer Overflow

<4.2-1
  • M
Information Exposure

<4.4.0-1
  • L
Information Exposure

<4.4.0-1
  • L
Information Exposure

<4.4.0-1
  • H
Access Restriction Bypass

<4.3.0-1
  • H
Access Restriction Bypass

<4.3.0-1
  • M
Access Restriction Bypass

<4.2.2-1
  • M
Information Exposure

<4.2.2-1
  • M
Out-of-Bounds

<4.3.0-1
  • M
Access Restriction Bypass

<4.4.1-3
  • H
Resource Management Errors

<4.3.0-1
  • H
Out-of-Bounds

<4.2.2-1
  • H
Numeric Errors

<4.3.0-1
  • H
CVE-2013-2196

<4.3.0-1
  • H
Numeric Errors

<4.3.0-1
  • M
Improper Input Validation

<4.2.2-1
  • H
Access Restriction Bypass

<4.1.4-3
  • M
Access Restriction Bypass

<4.1.4-3
  • M
Out-of-Bounds

<4.1.4-4
  • L
Improper Input Validation

<4.1.4-4
  • L
Improper Input Validation

<4.1.4-3
  • M
CVE-2013-0153

<4.1.4-2
  • M
Configuration

<4.1.3-8
  • H
Buffer Overflow

<4.1.3-8
  • M
CVE-2012-5514

<4.1.3-6
  • M
Resource Management Errors

<4.1.3-8
  • H
Improper Input Validation

<4.1.3-5
  • M
Configuration

<4.1.3-5
  • M
CVE-2012-5510

<4.1.3-5
  • M
CVE-2012-5515

<4.1.3-5
  • M
Out-of-Bounds

<4.1.3-5
  • M
Resource Management Errors

<4.1.2-1
  • L
CVE-2012-0218

<4.1.3~rc1+hg-20120614.a9c0a89c08f2-1
  • L
Access Restriction Bypass

<4.1.3-1
  • L
CVE-2012-2934

<4.1.3~rc1+hg-20120614.a9c0a89c08f2-1
  • M
Resource Management Errors

<4.1.3-1
  • M
Improper Input Validation

<4.1.3-4
  • H
Improper Input Validation

<4.1.3-2
  • M
Information Exposure

<4.1.3-2
  • M
Improper Input Validation

<4.1.3-2
  • H
Improper Input Validation

<4.1.4-1
  • M
Numeric Errors

<4.1.4-1
  • H
Improper Input Validation

<4.1.4-1
  • H
Improper Input Validation

<4.1.3-2
  • H
Improper Input Validation

<4.1.4-1
  • M
Configuration

<4.1.3-2
  • M
Access Restriction Bypass

<4.1.3-2
  • M
Improper Input Validation

<4.1.4-1
  • M
Access Restriction Bypass

<4.1.4-1
  • M
Improper Input Validation

<4.1.4-1
  • M
Access Restriction Bypass

<4.1.4-1
  • M
Configuration

<4.1.3-4
  • M
CVE-2012-4536

<4.1.3-4
  • M
Resource Management Errors

<4.1.3-4
  • L
Resource Management Errors

<4.1.3-4
  • L
Improper Input Validation

<4.1.3-4
  • M
Improper Input Validation

<4.1.3-4
  • H
Out-of-Bounds

<4.1.3~rc1+hg-20120614.a9c0a89c08f2-1
  • H
Out-of-Bounds

<4.1.3~rc1+hg-20120614.a9c0a89c08f2-1
  • M
Resource Management Errors

<4.1.1-1
  • H
Numeric Errors

<4.1.1-1
  • H
Access Restriction Bypass

<4.1.1-1
  • M
CVE-2010-4255

<4.0.1-2
  • M
Resource Management Errors

<4.0.1-1