xen vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://downloads.xenproject.org|xen package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Improper Access Control

[0,)
  • H
Buffer Overflow

[4.17,)
  • H
Denial of Service (DoS)

[4.17,)
  • H
Denial of Service (DoS)

[4.11,4.17)
  • H
Denial of Service (DoS)

[4.17.0,)
  • M
Denial of Service (DoS)

[0,)
  • H
Denial of Service (DoS)

[0,)
  • H
Denial of Service (DoS)

[0,)
  • H
Denial of Service (DoS)

[0,)
  • H
Denial of Service (DoS)

[0,)
  • H
Denial of Service (DoS)

[0,)
  • H
Denial of Service (DoS)

[0,)
  • H
Denial of Service (DoS)

[0,)
  • H
Denial of Service (DoS)

[0,)
  • H
Denial of Service (DoS)

[0,)
  • H
Denial of Service (DoS)

[0,)
  • M
Denial of Service (DoS)

[4.9,)
  • H
Privilege Escalation

[0,)
  • L
Information Exposure

[4.16]
  • M
Denial of Service (DoS)

[0,)
  • M
Denial of Service (DoS)

[0,)
  • M
Denial of Service (DoS)

[0,)
  • M
Denial of Service (DoS)

[0,)
  • M
Denial of Service (DoS)

[0,)
  • M
Denial of Service (DoS)

[0,)
  • L
Denial of Service (DoS)

[0,)
  • M
Denial of Service (DoS)

[4.0.0,)
  • H
Improper Control of a Resource Through its Lifetime

[0,)
  • H
Race Condition

[0,)
  • H
Privilege Escalation

[0,)
  • M
Race Condition

[4.0.0,)
  • H
Denial of Service (DoS)

[0,)
  • M
Code

[,4.0.0)
  • M
Denial of Service (DoS)

[,4.2.0)
  • M
Improper Input Validation

[3.2.0,4.4.1]
  • M
Buffer Overflow

[0,)
  • M
Out-of-Bounds

[4.10.0,)
  • M
Access Restriction Bypass

[4.0.0,4.2.0]
  • H
Access Restriction Bypass

[4.1.5,4.3.1]
  • M
Security Features

[4.4.0,4.6.0]
  • L
Out-of-Bounds

[3.2.0,4.4.0]
  • H
Access Restriction Bypass

[3.2.0,4.5.0]
  • M
Use of Externally-Controlled Format String

[,4.12.2)
  • M
Denial of Service (DoS)

[4.2.0,4.4.0]
  • H
Access Restriction Bypass

[0,)
  • C
NULL Pointer Dereference

[,4.8.2)
  • M
Resource Management Errors

[,4.2.0]
  • M
Improper Input Validation

[4.0.0,4.3.1]
  • M
Access Restriction Bypass

[4.3.0,4.6.1]
  • M
Use After Free

[0,)
  • M
Race Condition

[,4.7.1)
  • L
Information Exposure

[,4.3.1)
  • M
Improper Input Validation

[,4.4.0]
  • L
Improper Input Validation

[4.0.0,4.2.2]
  • M
NULL Pointer Dereference

[4.6.0,4.8.0]
  • C
Access Restriction Bypass

[,4.8.2)
  • H
Improper Access Control

[3.4.0,4.7.0]
  • M
Improper Authentication

[0,)
  • M
Out-of-Bounds

[4.8.0,4.12.2)
  • M
Denial of Service (DoS)

[3.2.0,)
  • M
Improper Input Validation

[,4.5.0]
  • M
NULL Pointer Dereference

[4.8.0,4.10.1)
  • L
Denial of Service (DoS)

[4.2.0,4.3.0]
  • M
Information Exposure

[0,)
  • L
User Enumeration

[0,)
  • H
Insufficient Verification of Data Authenticity

[0,)
  • M
Incorrect Authorization

[0,)
  • M
Security Features

[,4.6.0]
  • M
Denial of Service (DoS)

[4.2.0,4.4.0]
  • M
Improper Input Validation

[,4.11.3)
  • M
Information Exposure

[4.12.0,)
  • H
Resource Management Errors

[4.1.0,4.6.0]
  • H
Memory Leak

[,4.12.2)
  • M
Improper Access Control

[4.0.0,4.6.1]
  • M
Improper Input Validation

[4.8.0,4.14.0)
  • H
Race Condition

[,4.14.0)
  • C
Improper Input Validation

[,4.8.2)
  • H
Access Restriction Bypass

[4.2.1,4.3.1]
  • M
Untrusted Search Path

[0,)
  • H
Access Restriction Bypass

[0,)
  • H
Improper Input Validation

[0,)
  • M
Code

[4.3.0,4.5.0]
  • M
Code

[,4.4.2)
  • M
Denial of Service (DoS)

[3.3.0,4.2.1]
  • M
Out-of-Bounds

[3.4.0,4.1.0]
  • M
Code

[3.2.0,4.6.0]
  • H
Privilege Escalation

[4.0.0,)
  • M
Improper Access Control

[4.7.0,4.7.1]
  • M
Out-of-Bounds

[4.4.0,)
  • M
Denial of Service (DoS)

[,4.12.2)
  • M
Improper Input Validation

[4.0.0,4.2.0]
  • C
Access Restriction Bypass

[,4.8.2)
  • M
Access Restriction Bypass

[4.2.0,4.2.2]
  • H
Information Exposure

[0,)
  • H
Information Exposure

[,4.12.2)
  • L
Information Exposure

[4.2.0,4.5.0]
  • M
Memory Leak

[4.6.0,)
  • L
Information Exposure

[4.3.0,4.3.4][4.4.0,4.4.4][4.5.0,4.5.5)[4.6.0,4.6.3)
  • M
Denial of Service (DoS)

[4.11.0,4.11.2)
  • L
Improper Input Validation

[,4.4.0]
  • H
Out-of-Bounds

[,4.6.3)
  • H
Denial of Service (DoS)

[,4.2.3)
  • M
Denial of Service (DoS)

[,4.13.1)
  • M
Out-of-Bounds

[,4.4.0]
  • M
CVE-2021-28699

[4.10.0,)
  • L
Improper Input Validation

[3.1.3,4.2.2]
  • M
Improper Data Handling

[3.2.0,4.6.0]
  • H
Improper Input Validation

[4.0.0,4.2.0]
  • H
Race Condition

[,4.11.3)
  • H
Information Exposure

[4.3.0,4.6.1]
  • M
Improper Input Validation

[4.2.0,4.3.1]
  • M
Out-of-Bounds

[4.2.0,4.3.0]
  • H
Access Restriction Bypass

[4.0.0,4.7.1]
  • H
Access Restriction Bypass

[3.3.0,4.5.0]
  • M
NULL Pointer Dereference

[4.4.0,)
  • M
Denial of Service (DoS)

[4.0.0,4.2.0]
  • M
Denial of Service (DoS)

[,4.2.1)
  • M
Resource Management Errors

[4.1.1,4.3.1]
  • M
Improper Data Handling

[,4.8.2)
  • M
Denial of Service (DoS)

[0,)
  • M
Access Restriction Bypass

[,4.4.0]
  • H
Improper Input Validation

[4.8.0,4.12.2)
  • M
Cleansing

[,4.11.2)
  • M
Improper Input Validation

[4.1.0,4.2.0]
  • H
Privilege Escalation

[3.2.0,)
  • H
Out-of-bounds Read

[,4.9.1)
  • M
Code

[,4.4.2)
  • H
Security Features

[,4.6.1)
  • M
Cross-site Scripting (XSS)

[4.0.0,4.2.0]
  • M
Improper Input Validation

[4.8.0,4.14.0)
  • M
Out-of-Bounds

[,4.6.1)
  • M
Improper Access Control

[4.5.0,4.7.1]
  • H
Improper Input Validation

[0,)
  • M
Information Exposure

[,4.9.0]
  • M
Improper Input Validation

[4.8.0,4.11.3)
  • M
Race Condition

[4.1.0,4.4.1]
  • M
Arbitrary Code Injection

[3.2.0,)
  • H
Access Restriction Bypass

[4.8.0,4.8.1]
  • H
Denial of Service (DoS)

[,4.9.1)
  • M
Resource Management Errors

[3.3.0,4.5.0]
  • M
Improper Input Validation

[3.1.3,4.3.4]
  • H
Improper Input Validation

[4.0.0,4.2.0]
  • M
Improper Input Validation

[4.5.0,4.9.0]
  • M
Resource Management Errors

[4.2.0,4.3.1]
  • H
Access Restriction Bypass

[,4.10.1)
  • L
Code

[3.2.1,4.4.0]
  • M
NULL Pointer Dereference

[0,)
  • L
Resource Management Errors

[3.4.0,4.2.0]
  • M
Code

[3.3.0,4.6.0]
  • H
Access Restriction Bypass

[4.6.0,4.6.5]
  • M
Denial of Service (DoS)

[,4.10.1)
  • M
Information Exposure

[,4.9.2)
  • M
Access Restriction Bypass

[,4.3.0]
  • M
Improper Input Validation

[4.0.2,4.2.2]
  • H
Race Condition

[,4.12.2)
  • H
Access Restriction Bypass

[0,)
  • M
Resource Management Errors

[,4.10.2)
  • M
Denial of Service (DoS)

[4.4.0,)
  • M
Resource Management Errors

[4.0.0,4.1.0]
  • M
Improper Input Validation

[4.0.0,4.2.0]
  • M
Access Restriction Bypass

[3.0.2,4.4.0]
  • H
Improper Input Validation

[,4.2.1)
  • H
Information Exposure

[0,)
  • M
Command Injection

[,4.12.2)
  • M
Denial of Service (DoS)

[0,)
  • H
Access Restriction Bypass

[,4.13.1)
  • M
Out-of-Bounds

[4.4.0,)
  • H
Race Condition

[4.5.0,)
  • M
Improper Input Validation

[4.3.0,4.5.0]
  • L
Improper Input Validation

[,25589\:60f09d1ab1fe)
  • M
Improper Input Validation

[,4.12.2)
  • H
Race Condition

[4.6.0,4.9.0]
  • M
Resource Management Errors

[4.4.0,4.4.1]
  • M
Resource Management Errors

[3.1.3,4.5.0]
  • H
Improper Input Validation

[3.4.0,4.6.0]
  • M
Information Exposure

[4.0.0,4.2.0]
  • H
Access Restriction Bypass

[4.11.0,4.11.2)
  • H
Access Restriction Bypass

[,4.0.0]
  • M
Access Restriction Bypass

[4.0.0,4.2.2]
  • M
Improper Input Validation

[4.1.0,4.4.0]
  • H
Denial of Service (DoS)

[,4.8.2)
  • M
Information Exposure

[4.5.0,4.9.0]
  • M
Denial of Service (DoS)

[4.2.0,4.5.0]
  • M
Race Condition

[0,)
  • C
Improper Data Handling

[,4.8.2)
  • M
Denial of Service (DoS)

[4.2.0,4.3.1]
  • H
Access Restriction Bypass

[,4.10.2)
  • M
Access Restriction Bypass

[4.4.0,4.5.1]
  • C
Information Exposure

[4.7.0,4.10.2)
  • M
Information Exposure

[3.2.0,4.5.0]
  • M
Denial of Service (DoS)

[4.8.0,4.12.2)
  • H
Resource Management Errors

[0,)
  • M
Access Restriction Bypass

[4.1.0,4.2.1]
  • M
Access Restriction Bypass

[3.3.0,4.4.1]
  • H
CVE-2013-2196

[,4.2.3)
  • M
Resource Management Errors

[3.4.0,4.2.0]
  • H
Access Restriction Bypass

[4.5.3,4.7.0]
  • L
Information Exposure

[,4.3.0)
  • M
Denial of Service (DoS)

[,4.2.0]
  • M
Out-of-Bounds

[,4.9.1)
  • M
Improper Input Validation

[,4.6.3)
  • M
Information Exposure

[3.2.0,4.13.1)
  • H
Access Restriction Bypass

[4.0.0,4.2.2]
  • H
Improper Input Validation

[,4.11.3)
  • M
Improper Input Validation

[4.5.0,4.7.0]
  • M
Denial of Service (DoS)

[0,)
  • H
Privilege Escalation

[0,)
  • H
Access Restriction Bypass

[,4.8.1)
  • M
Denial of Service (DoS)

[4.12.0,)
  • M
Cross-site Scripting (XSS)

[3.4.0,4.2.0]
  • M
Improper Input Validation

[,4.4.0]
  • M
Information Exposure

[3.3.0,4.3.0]
  • M
Information Exposure

[0,)
  • M
CVE-2021-26933

[4.9.0,)
  • M
Denial of Service (DoS)

[4.6.0,4.6.1]
  • M
Resource Management Errors

[4.0.0,4.5.0]
  • H
Access Restriction Bypass

[,4.9.1)
  • M
Resource Management Errors

[4.2.0,4.3.0]
  • M
Resource Management Errors

[3.4.0,4.6.0]
  • H
Access Restriction Bypass

[,4.2.0]
  • M
Access Restriction Bypass

[4.1.0,4.4.0]
  • H
Denial of Service (DoS)

[,4.2.3)
  • H
Access Restriction Bypass

[4.1.0,4.5.0]
  • M
Improper Access Control

[4.7.0,4.7.1]
  • M
Improper Input Validation

[,4.0.2)
  • M
Access Restriction Bypass

[3.0.2,4.2.1]
  • M
Denial of Service (DoS)

[4.4.0,4.9.0]
  • H
Access Restriction Bypass

[0,)
  • M
Improper Access Control

[4.7.0,4.7.1]
  • M
Out-of-Bounds

[3.3.0,4.1.6.1]
  • M
Improper Input Validation

[,4.11.2)
  • H
Race Condition

[,4.8.2)
  • M
Improper Handling of Exceptional Conditions

[4.11.0,)
  • M
Information Exposure

[4.7.0,4.7.1]
  • M
Cross-site Scripting (XSS)

[4.0.0,4.2.1]
  • H
Information Exposure

[4.5.0,4.8.1]
  • H
Improper Data Handling

[,4.9.2)
  • M
Improper Input Validation

[,4.11.3)
  • L
Denial of Service (DoS)

[,4.2.0]
  • M
Out-of-Bounds

[,4.7.1)
  • H
Off-by-one Error

[0,)
  • H
Improper Input Validation

[4.1.0,4.1.3]
  • L
Access Restriction Bypass

[,4.5.1)
  • M
CVE-2021-28690

[4.12,)
  • H
Access Restriction Bypass

[4.8.0,4.8.1]
  • M
Access Restriction Bypass

[4.1.0,4.2.2]
  • H
Access Restriction Bypass

[,4.9.2)
  • M
Improper Input Validation

[,4.5.5)
  • M
Out-of-bounds Write

[,4.10.2)
  • H
Off-by-one Error

[4.8,4.12.2)
  • M
Out-of-Bounds

[4.1.0,4.3.1]
  • M
Missing Initialization of Resource

[4.12,)
  • C
Privilege Escalation

[,4.12.2)
  • M
Race Condition

[,4.12.2)
  • M
NULL Pointer Dereference

[4.5.0,4.9.0]
  • H
Memory Leak

[0,)
  • M
Code

[4.1.0,4.5.1]
  • M
Access Restriction Bypass

[4.3.0,4.5.0]
  • M
Improper Input Validation

[4.2.0,4.4.0]
  • M
Access Restriction Bypass

[0,)
  • M
Race Condition

[,4.9.1)
  • M
Resource Management Errors

[4.4.0,4.6.0]
  • M
Resource Management Errors

[,4.10.2)
  • M
Out-of-Bounds

[0,)
  • M
Out-of-Bounds

[0,)
  • M
Improper Input Validation

[,4.9.2)
  • H
Race Condition

[,4.9.0]
  • M
Denial of Service (DoS)

[0,)
  • H
Race Condition

[3.2.0,)
  • M
Code

[3.3.0,4.4.0]
  • M
Improper Handling of Exceptional Conditions

[4.10.0,4.14.0)
  • H
Improper Input Validation

[4.1.0,4.11.3)
  • H
Incorrect Calculation

[,4.12.2)
  • M
Resource Management Errors

[4.0.0,4.2.0]
  • M
Resource Management Errors

[4.2.0,4.4.0]
  • M
Use After Free

[4.4.0,4.4.4]
  • L
Access Restriction Bypass

[3.3.0,4.2.0]
  • L
Information Exposure

[,4.3.1)
  • H
Access Restriction Bypass

[,4.11.2)
  • M
Improper Input Validation

[,4.8.1)
  • M
Denial of Service (DoS)

[,4.11.1)
  • M
Improper Input Validation

[4.6.0,4.8.1]
  • M
Incorrect Calculation

[4.5.0,4.7.1]
  • L
Information Exposure

[,4.4.0]
  • M
Information Exposure

[4.0.0,4.2.2]
  • M
Access Restriction Bypass

[,4.11.1)
  • C
Access Restriction Bypass

[,4.8.2)
  • M
Denial of Service (DoS)

[,4.2.1)
  • M
Out-of-Bounds

[3.4.0,4.3.1]
  • H
Access Restriction Bypass

[,4.5.1)
  • M
Resource Management Errors

[4.2.0,4.4.0]
  • H
Out-of-Bounds

[4.0.0,4.2.2]
  • M
Information Exposure

[3.2.0,4.5.0]
  • M
Out-of-Bounds

[,4.12.0)
  • L
Denial of Service (DoS)

[3.4.0,4.1.0]
  • M
Improper Input Validation

[,4.4.0]
  • M
Access Restriction Bypass

[,4.4.0]
  • M
Improper Access Control

[4.7.0,4.7.1]
  • L
Information Exposure

[,4.4.1)
  • H
Access Restriction Bypass

[,4.9.0]
  • H
Improper Input Validation

[0,)
  • M
Denial of Service (DoS)

[,4.3.1)
  • M
Denial of Service (DoS)

[,4.12.2)
  • L
Information Exposure

[4.0.0,4.3.0]
  • M
Information Exposure

[,4.5.1)
  • H
Access Restriction Bypass

[4.0.0,4.1.5]
  • H
Error Handling

[,4.9.2)
  • M
Improper Input Validation

[4.4.0,4.7.1]
  • M
Denial of Service (DoS)

[4.13.1,)
  • H
Improper Input Validation

[3.4.0,4.6.0]
  • H
Access Restriction Bypass

[4.0.0,4.2.3]
  • M
Improper Input Validation

[,4.2.1)
  • M
Improper Data Handling

[3.2.0,4.6.0]
  • H
Privilege Escalation

[4.2.0,)
  • H
Out-of-Bounds

[,4.13.1)
  • M
Out-of-Bounds

[3.3.0,4.8.1]
  • M
Access Restriction Bypass

[3.3.0,4.5.0]
  • M
Information Exposure

[,4.10.2)
  • H
Denial of Service (DoS)

[3.2.0,4.14.0)
  • M
Denial of Service (DoS)

[,4.11.1)
  • M
Improper Input Validation

[,4.11.3)
  • M
Improper Data Handling

[,4.9.2)
  • M
Out-of-Bounds

[3.3.0,4.3.0]
  • M
Out-of-Bounds

[4.1.0,4.2.2]
  • H
Access Restriction Bypass

[,4.4.0]
  • H
Race Condition

[,4.11.3)
  • M
Improper Input Validation

[4.1.0,4.1.6.1][4.2.0,4.2.5][4.3.0,4.4.0)
  • H
Improper Input Validation

[3.2.0,4.11.3)
  • H
Access Restriction Bypass

[,4.9.1)
  • H
Improper Input Validation

[4.0.0,4.2.0]
  • M
Access Restriction Bypass

[3.0.3,4.3.1]
  • H
Improper Data Handling

[,4.9.1)
  • H
Access Restriction Bypass

[,4.6.3)
  • H
Resource Management Errors

[4.1.0,4.2.2]
  • H
Denial of Service (DoS)

[4.2.0,4.4.1]
  • H
Privilege Escalation

[3.2.0,4.12.0)
  • H
Resource Management Errors

[4.1.0,4.4.1]
  • H
NULL Pointer Dereference

[4.9.0,4.11.1)
  • M
Resource Management Errors

[4.0.0,4.6.0]
  • M
Improper Handling of Exceptional Conditions

[,4.13.1)
  • M
Denial of Service (DoS)

[4.0.0,4.2.0]
  • H
Access Restriction Bypass

[,4.11.2)
  • L
Information Exposure

[3.3.0,4.7.0]
  • H
Privilege Escalation

[4.0.0,)
  • M
Resource Management Errors

[,4.1.2)
  • M
Access Restriction Bypass

[,4.4.0]
  • C
Race Condition

[,4.8.2)
  • M
Access Restriction Bypass

[4.0.0,4.2.0]
  • M
Improper Input Validation

[4.0.0,4.2.0]
  • M
Always-Incorrect Control Flow Implementation

[4.12.0,)
  • H
Out-of-Bounds

[,4.9.2)
  • M
Access Restriction Bypass

[3.3.0,4.3.0]
  • H
Access Restriction Bypass

[4.2.0,4.3.1]
  • M
Denial of Service (DoS)

[4.4.0,4.6.1]
  • H
Out-of-Bounds

[,4.1.3)
  • H
Access Restriction Bypass

[,4.11.1)
  • H
Out-of-bounds Read

[,4.11.1)
  • M
Denial of Service (DoS)

[,4.12.2)
  • H
Unchecked Return Value

[0,)
  • M
Access Restriction Bypass

[3.3.0,4.5.0]
  • M
Resource Management Errors

[4.3.0,4.6.5]
  • H
Insecure Default

[,4.14.0)
  • M
NULL Pointer Dereference

[0,)
  • M
Resource Management Errors

[4.3.0,4.6.6]
  • M
Denial of Service (DoS)

[0,)
  • H
Out-of-Bounds

[,4.5.0]
  • C
Out-of-bounds Read

[,4.7.2)
  • H
Out-of-bounds Write

[0,)
  • H
Out-of-bounds Write

[0,)
  • L
Resource Management Errors

[,4.3.1)
  • L
Denial of Service (DoS)

[4.4.3,4.5.1]
  • H
Buffer Overflow

[0,)
  • H
Out-of-bounds Write

[0,)
  • H
Out-of-Bounds

[,4.5.1)
  • C
Out-of-bounds Read

[,4.7.2)
  • H
Improper Input Validation

[4.0.0,4.1.0]
  • M
Denial of Service (DoS)

[,1.3.0)