xen-tools vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the xen-tools package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
CVE-2024-45819

<4.13.5_16-150200.3.99.1
  • H
CVE-2024-45818

<4.13.5_16-150200.3.99.1
  • M
CVE-2024-45817

<4.13.5_16-150200.3.99.1
  • L
CVE-2024-31146

<4.13.5_14-150200.3.96.1
  • H
CVE-2024-31145

<4.13.5_14-150200.3.96.1
  • H
CVE-2024-31143

<4.13.5_12-150200.3.93.1
  • M
CVE-2024-31142

<4.13.5_12-150200.3.93.1
  • M
CVE-2024-2193

<4.13.5_12-150200.3.93.1
  • M
CVE-2024-2201

<4.13.5_12-150200.3.93.1
  • M
CVE-2023-46842

<4.13.5_12-150200.3.93.1
  • M
CVE-2023-28746

<4.13.5_12-150200.3.93.1
  • M
CVE-2023-46839

<4.13.5_10-150200.3.86.1
  • M
CVE-2023-46836

<4.13.5_08-150200.3.83.1
  • M
CVE-2023-46835

<4.13.5_08-150200.3.83.1
  • M
CVE-2023-34328

<4.13.5_06-150200.3.80.1
  • M
CVE-2023-34327

<4.13.5_06-150200.3.80.1
  • H
CVE-2023-34326

<4.13.5_06-150200.3.80.1
  • M
Out-of-bounds Write

<4.13.5_06-150200.3.80.1
  • M
NULL Pointer Dereference

<4.13.5_06-150200.3.80.1
  • H
Improper Check for Dropped Privileges

<4.13.5_04-150200.3.77.1
  • M
CVE-2023-20593

<4.13.5_04-150200.3.77.1
  • M
Divide By Zero

<4.13.5_04-150200.3.77.1
  • M
Information Exposure

<4.13.5_04-150200.3.77.1
  • M
CVE-2023-20593

<4.13.5_02-150200.3.74.1
  • M
Information Exposure

<4.13.5_02-150200.3.74.1
  • M
Information Exposure

<4.13.5_02-150200.3.74.1
  • M
Allocation of Resources Without Limits or Throttling

<4.13.4_20-150200.3.71.1
  • M
Allocation of Resources Without Limits or Throttling

<4.13.4_20-150200.3.71.1
  • H
Use After Free

<4.13.4_20-150200.3.71.1
  • M
CVE-2022-42331

<4.13.4_20-150200.3.71.1
  • M
CVE-2022-23824

<4.13.4_18-150200.3.68.1
  • M
Memory Leak

<4.13.4_16-150200.3.65.1
  • M
Memory Leak

<4.13.4_16-150200.3.65.1
  • M
Memory Leak

<4.13.4_16-150200.3.65.1
  • M
Memory Leak

<4.13.4_16-150200.3.65.1
  • M
Uncontrolled Recursion

<4.13.4_16-150200.3.65.1
  • H
Incomplete Cleanup

<4.13.4_16-150200.3.65.1
  • M
Memory Leak

<4.13.4_16-150200.3.65.1
  • M
Allocation of Resources Without Limits or Throttling

<4.13.4_16-150200.3.65.1
  • M
Allocation of Resources Without Limits or Throttling

<4.13.4_16-150200.3.65.1
  • M
Allocation of Resources Without Limits or Throttling

<4.13.4_16-150200.3.65.1
  • M
Allocation of Resources Without Limits or Throttling

<4.13.4_16-150200.3.65.1
  • M
Allocation of Resources Without Limits or Throttling

<4.13.4_16-150200.3.65.1
  • M
Allocation of Resources Without Limits or Throttling

<4.13.4_16-150200.3.65.1
  • M
Allocation of Resources Without Limits or Throttling

<4.13.4_16-150200.3.65.1
  • M
Allocation of Resources Without Limits or Throttling

<4.13.4_16-150200.3.65.1
  • M
Incomplete Cleanup

<4.13.4_16-150200.3.65.1
  • H
Release of Invalid Pointer or Reference

<4.13.4_16-150200.3.65.1
  • M
Improper Handling of Exceptional Conditions

<4.13.4_16-150200.3.65.1
  • M
Improper Resource Shutdown or Release

<4.13.4_16-150200.3.65.1
  • M
Improper Cross-boundary Removal of Sensitive Data

<4.13.4_16-150200.3.65.1
  • H
CVE-2022-33745

<4.13.4_12-150200.3.58.1
  • H
CVE-2022-26364

<4.13.4_12-150200.3.58.1
  • M
Improper Cross-boundary Removal of Sensitive Data

<4.13.4_12-150200.3.58.1
  • H
CVE-2022-26363

<4.13.4_12-150200.3.58.1
  • H
Race Condition

<4.13.4_12-150200.3.58.1
  • M
Exposure of Resource to Wrong Sphere

<4.13.4_12-150200.3.58.1
  • M
CVE-2022-23816

<4.13.4_12-150200.3.58.1
  • M
Incomplete Cleanup

<4.13.4_12-150200.3.58.1
  • M
Incomplete Cleanup

<4.13.4_12-150200.3.58.1
  • M
Incomplete Cleanup

<4.13.4_12-150200.3.58.1
  • H
CVE-2022-26364

<4.13.4_10-150200.3.55.1
  • H
CVE-2022-26363

<4.13.4_10-150200.3.55.1
  • H
Race Condition

<4.13.4_10-150200.3.55.1
  • M
CVE-2022-26361

<4.13.4_08-150200.3.50.1
  • M
CVE-2022-26360

<4.13.4_08-150200.3.50.1
  • M
CVE-2022-26359

<4.13.4_08-150200.3.50.1
  • M
CVE-2022-26358

<4.13.4_08-150200.3.50.1
  • M
Race Condition

<4.13.4_08-150200.3.50.1
  • M
Improper Locking

<4.13.4_08-150200.3.50.1
  • M
CVE-2022-0002

<4.13.4_08-150200.3.50.1
  • M
CVE-2022-0001

<4.13.4_08-150200.3.50.1
  • M
CVE-2021-26401

<4.13.4_08-150200.3.50.1
  • M
Improper Check for Unusual or Exceptional Conditions

<4.13.1_04-3.4.1
  • M
Race Condition

<4.13.1_04-3.4.1
  • M
Out-of-Bounds

<4.13.1_04-3.4.1
  • H
Resource Exhaustion

<4.13.1_04-3.4.1
  • M
Incomplete Cleanup

<4.13.1_04-3.4.1
  • L
SUSE-SU-2020:2160-1

<4.13.1_06-3.7.1
  • M
Improper Handling of Exceptional Conditions

<4.13.1_08-3.10.1
  • H
Always-Incorrect Control Flow Implementation

<4.13.1_08-3.10.1
  • M
CVE-2020-25601

<4.13.1_08-3.10.1
  • M
Race Condition

<4.13.1_08-3.10.1
  • H
Out-of-Bounds

<4.13.1_08-3.10.1
  • H
Out-of-bounds Write

<4.13.1_08-3.10.1
  • M
Improper Handling of Exceptional Conditions

<4.13.1_08-3.10.1
  • M
Always-Incorrect Control Flow Implementation

<4.13.1_08-3.10.1
  • M
Arbitrary Code Injection

<4.13.1_08-3.10.1
  • H
Improper Privilege Management

<4.13.1_08-3.10.1
  • H
CVE-2020-27671

<4.13.1_10-3.13.1
  • M
CVE-2020-27673

<4.13.1_10-3.13.1
  • H
Race Condition

<4.13.1_10-3.13.1
  • H
Insufficient Verification of Data Authenticity

<4.13.1_10-3.13.1
  • M
Missing Authorization

<4.13.2_02-3.16.2
  • M
Missing Authorization

<4.13.2_04-3.19.1
  • H
Insufficient Verification of Data Authenticity

<4.13.2_04-3.19.1
  • H
Race Condition

<4.13.2_04-3.19.1
  • H
CVE-2020-27671

<4.13.2_04-3.19.1
  • M
Out-of-bounds Write

<4.13.2_04-3.19.1
  • M
Improper Privilege Management

<4.13.2_06-3.22.1
  • M
NULL Pointer Dereference

<4.13.2_06-3.22.1
  • M
Uncontrolled Recursion

<4.13.2_06-3.22.1
  • M
Allocation of Resources Without Limits or Throttling

<4.13.2_06-3.22.1
  • M
Use After Free

<4.13.2_06-3.22.1
  • M
NULL Pointer Dereference

<4.13.2_06-3.22.1
  • L
Missing Authorization

<4.13.2_06-3.22.1
  • M
CVE-2021-3308

<4.13.2_08-3.25.3
  • M
Missing Initialization of Resource

<4.13.2_08-3.25.3
  • M
CVE-2021-28699

<4.13.3_02-3.34.1
  • H
CVE-2021-28695

<4.13.3_02-3.34.1
  • H
CVE-2021-28694

<4.13.3_02-3.34.1
  • M
CVE-2021-28693

<4.13.3_02-3.34.1
  • M
Allocation of Resources Without Limits or Throttling

<4.13.3_02-3.34.1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<4.13.3_02-3.34.1
  • H
Race Condition

<4.13.3_02-3.34.1
  • H
Incorrect Authorization

<4.13.3_02-3.34.1
  • M
Improper Privilege Management

<4.13.3_02-3.34.1
  • M
CVE-2021-28690

<4.13.3_02-3.34.1
  • M
Information Exposure

<4.13.3_02-3.34.1
  • H
Race Condition

<4.13.3_04-3.37.1
  • M
CVE-2021-28708

<4.13.4_02-3.40.1
  • M
Improper Handling of Exceptional Conditions

<4.13.4_02-3.40.1
  • M
Improper Handling of Exceptional Conditions

<4.13.4_02-3.40.1
  • M
Allocation of Resources Without Limits or Throttling

<4.13.4_02-3.40.1
  • M
CVE-2021-28707

<4.13.4_02-3.40.1
  • M
Improper Privilege Management

<4.13.4_02-3.40.1
  • M
CVE-2021-28704

<4.13.4_02-3.40.1
  • M
Incomplete Cleanup

<4.13.4_04-3.43.2
  • L
Integer Underflow

<4.13.4_04-3.43.2
  • H
Improper Resource Shutdown or Release

<4.13.4_04-3.43.2