xen-tools vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the xen-tools package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Improper Input Validation

<4.10.4_04-3.22.1
  • H
Improper Input Validation

<4.10.4_04-3.22.1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<4.10.4_04-3.22.1
  • H
Race Condition

<4.10.4_04-3.22.1
  • M
Improper Input Validation

<4.10.4_04-3.22.1
  • M
Information Exposure

<4.10.4_04-3.22.1
  • H
Improper Synchronization

<4.10.4_04-3.22.1
  • H
Improper Locking

<4.10.4_04-3.22.1
  • M
CVE-2019-11091

<4.10.4_04-3.22.1
  • M
Memory Leak

<4.10.4_04-3.22.1
  • H
Race Condition

<4.10.4_04-3.22.1
  • M
Information Exposure

<4.10.4_04-3.22.1
  • M
Information Exposure

<4.10.4_04-3.22.1
  • H
CVE-2019-17345

<4.10.4_04-3.22.1
  • M
Memory Leak

<4.10.4_40-150000.3.84.1
  • M
Memory Leak

<4.10.4_40-150000.3.84.1
  • M
Memory Leak

<4.10.4_40-150000.3.84.1
  • M
Uncontrolled Recursion

<4.10.4_40-150000.3.84.1
  • H
Incomplete Cleanup

<4.10.4_40-150000.3.84.1
  • M
Memory Leak

<4.10.4_40-150000.3.84.1
  • M
Allocation of Resources Without Limits or Throttling

<4.10.4_40-150000.3.84.1
  • M
Allocation of Resources Without Limits or Throttling

<4.10.4_40-150000.3.84.1
  • M
Allocation of Resources Without Limits or Throttling

<4.10.4_40-150000.3.84.1
  • M
Memory Leak

<4.10.4_40-150000.3.84.1
  • M
Allocation of Resources Without Limits or Throttling

<4.10.4_40-150000.3.84.1
  • M
Allocation of Resources Without Limits or Throttling

<4.10.4_40-150000.3.84.1
  • M
Allocation of Resources Without Limits or Throttling

<4.10.4_40-150000.3.84.1
  • M
Allocation of Resources Without Limits or Throttling

<4.10.4_40-150000.3.84.1
  • M
Allocation of Resources Without Limits or Throttling

<4.10.4_40-150000.3.84.1
  • M
Incomplete Cleanup

<4.10.4_40-150000.3.84.1
  • H
Release of Invalid Pointer or Reference

<4.10.4_40-150000.3.84.1
  • M
Improper Handling of Exceptional Conditions

<4.10.4_40-150000.3.84.1
  • M
Improper Resource Shutdown or Release

<4.10.4_40-150000.3.84.1
  • M
Improper Cross-boundary Removal of Sensitive Data

<4.10.4_40-150000.3.84.1
  • H
CVE-2022-33745

<4.10.4_36-150000.3.77.1
  • M
Improper Cross-boundary Removal of Sensitive Data

<4.10.4_36-150000.3.77.1
  • H
CVE-2022-26364

<4.10.4_36-150000.3.77.1
  • H
CVE-2022-26363

<4.10.4_36-150000.3.77.1
  • H
Race Condition

<4.10.4_36-150000.3.77.1
  • M
Exposure of Resource to Wrong Sphere

<4.10.4_36-150000.3.77.1
  • M
CVE-2022-23816

<4.10.4_36-150000.3.77.1
  • M
Incomplete Cleanup

<4.10.4_36-150000.3.77.1
  • M
Incomplete Cleanup

<4.10.4_36-150000.3.77.1
  • M
Incomplete Cleanup

<4.10.4_36-150000.3.77.1
  • M
CVE-2022-26361

<4.10.4_34-150000.3.74.1
  • M
CVE-2022-26360

<4.10.4_34-150000.3.74.1
  • M
CVE-2022-26359

<4.10.4_34-150000.3.74.1
  • M
CVE-2022-0002

<4.10.4_34-150000.3.74.1
  • M
CVE-2022-26358

<4.10.4_34-150000.3.74.1
  • M
Race Condition

<4.10.4_34-150000.3.74.1
  • M
Improper Locking

<4.10.4_34-150000.3.74.1
  • M
CVE-2022-0001

<4.10.4_34-150000.3.74.1
  • M
CVE-2021-26401

<4.10.4_34-150000.3.74.1
  • H
Information Exposure

<4.10.1_06-3.3.1
  • H
CVE-2018-3646

<4.10.1_08-3.6.1
  • M
Information Exposure

<4.10.1_06-3.3.1
  • H
CVE-2018-12893

<4.10.1_06-3.3.1
  • H
CVE-2018-12891

<4.10.1_06-3.3.1
  • H
CVE-2018-3646

<4.10.2_04-3.9.1
  • M
Interpretation Conflict

<4.10.2_04-3.9.1
  • M
Resource Exhaustion

<4.10.2_04-3.9.1
  • M
CVE-2018-19965

<4.10.2_04-3.9.1
  • H
Information Exposure

<4.10.2_04-3.9.1
  • H
Incomplete Cleanup

<4.10.2_04-3.9.1
  • M
Incorrect Authorization

<4.10.2_04-3.9.1
  • M
NULL Pointer Dereference

<4.10.2_04-3.9.1
  • M
Resource Exhaustion

<4.10.2_04-3.9.1
  • M
Improper Input Validation

<4.10.3_02-3.14.1
  • M
CVE-2019-11091

<4.10.3_04-3.19.1
  • M
Information Exposure

<4.10.3_04-3.19.1
  • M
Information Exposure

<4.10.3_04-3.19.1
  • M
Information Exposure

<4.10.3_04-3.19.1
  • M
Improper Input Validation

<4.10.4_06-3.25.1
  • H
OS Command Injection

<4.10.4_06-3.25.1
  • H
Race Condition

<4.10.4_06-3.25.1
  • H
Improper Privilege Management

<4.10.4_06-3.25.1
  • H
Use of Externally-Controlled Format String

<4.10.4_06-3.25.1
  • M
CVE-2019-11135

<4.10.4_06-3.25.1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<4.10.4_08-3.28.1
  • H
Incorrect Permission Assignment for Critical Resource

<4.10.4_08-3.28.1
  • H
CVE-2019-19583

<4.10.4_08-3.28.1
  • M
Race Condition

<4.10.4_08-3.28.1
  • M
Improper Input Validation

<4.10.4_08-3.28.1
  • M
Out-of-Bounds

<4.10.4_08-3.28.1
  • H
Incorrect Calculation

<4.10.4_08-3.28.1
  • H
Off-by-one Error

<4.10.4_08-3.28.1
  • H
Memory Leak

<4.10.4_08-3.28.1
  • M
Improper Handling of Exceptional Conditions

<4.10.4_10-3.31.1
  • M
CVE-2020-11742

<4.10.4_10-3.31.1
  • H
Missing Initialization of Resource

<4.10.4_10-3.31.1
  • H
Improper Cross-boundary Removal of Sensitive Data

<4.10.4_10-3.31.1
  • H
Race Condition

<4.10.4_10-3.31.1
  • M
Incomplete Cleanup

<4.10.4_10-3.31.1
  • M
Out-of-Bounds

<4.10.4_12-3.35.1
  • M
Race Condition

<4.10.4_12-3.35.1
  • M
Improper Check for Unusual or Exceptional Conditions

<4.10.4_12-3.35.1
  • H
Resource Exhaustion

<4.10.4_12-3.35.1
  • L
SUSE-SU-2020:2159-1

<4.10.4_14-3.38.1
  • M
Race Condition

<4.10.4_16-3.41.1
  • M
Arbitrary Code Injection

<4.10.4_16-3.41.1
  • H
Always-Incorrect Control Flow Implementation

<4.10.4_16-3.41.1
  • M
CVE-2020-25601

<4.10.4_16-3.41.1
  • H
Out-of-Bounds

<4.10.4_16-3.41.1
  • H
Out-of-bounds Write

<4.10.4_16-3.41.1
  • M
Improper Handling of Exceptional Conditions

<4.10.4_16-3.41.1
  • H
Improper Privilege Management

<4.10.4_16-3.41.1
  • H
Race Condition

<4.10.4_18-3.44.1
  • M
CVE-2020-27673

<4.10.4_18-3.44.1
  • H
CVE-2020-27671

<4.10.4_18-3.44.1
  • H
Insufficient Verification of Data Authenticity

<4.10.4_18-3.44.1
  • M
Missing Authorization

<4.10.4_20-3.47.1
  • H
Race Condition

<4.10.4_22-3.50.1
  • M
Missing Authorization

<4.10.4_22-3.50.1
  • H
CVE-2020-27671

<4.10.4_22-3.50.1
  • M
Out-of-bounds Write

<4.10.4_22-3.50.1
  • H
Insufficient Verification of Data Authenticity

<4.10.4_22-3.50.1
  • L
Missing Authorization

<4.10.4_24-3.53.1
  • M
NULL Pointer Dereference

<4.10.4_24-3.53.1
  • M
Allocation of Resources Without Limits or Throttling

<4.10.4_24-3.53.1
  • M
Uncontrolled Recursion

<4.10.4_24-3.53.1
  • M
NULL Pointer Dereference

<4.10.4_24-3.53.1
  • M
Use After Free

<4.10.4_24-3.53.1
  • M
Improper Privilege Management

<4.10.4_24-3.53.1
  • H
CVE-2021-27379

<4.10.4_24-3.56.1
  • M
CVE-2021-28699

<4.10.4_26-3.61.1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<4.10.4_26-3.61.1
  • H
Race Condition

<4.10.4_26-3.61.1
  • H
Incorrect Authorization

<4.10.4_26-3.61.1
  • H
CVE-2021-28695

<4.10.4_26-3.61.1
  • H
CVE-2021-28694

<4.10.4_26-3.61.1
  • M
Improper Privilege Management

<4.10.4_26-3.61.1
  • M
CVE-2021-28690

<4.10.4_26-3.61.1
  • M
Information Exposure

<4.10.4_26-3.61.1
  • M
Improper Handling of Exceptional Conditions

<4.10.4_30-3.68.1
  • M
CVE-2021-28708

<4.10.4_30-3.68.1
  • M
CVE-2021-28707

<4.10.4_30-3.68.1
  • M
Allocation of Resources Without Limits or Throttling

<4.10.4_30-3.68.1
  • M
Improper Handling of Exceptional Conditions

<4.10.4_30-3.68.1
  • H
Race Condition

<4.10.4_30-3.68.1
  • M
CVE-2021-28704

<4.10.4_30-3.68.1
  • M
Incomplete Cleanup

<4.10.4_32-3.71.1
  • L
Integer Underflow

<4.10.4_32-3.71.1