8.3 High
CVSS2
Access Vector
ADJACENT_NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:A/AC:L/Au:N/C:C/I:C/A:C
0.005 Low
EPSS
Percentile
74.9%
Xen is a bare-metal hypervisor.
Multiple vulnerabilities have been discovered in Xen. Please review the CVE identifiers referenced below for details.
A remote attacker can utilize multiple vectors to execute arbitrary code, cause Denial of Service, or gain access to data on the host.
There is no known workaround at this time.
All Xen 4.3 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-emulations/xen-4.3.2-r2"
All Xen 4.2 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-emulations/xen-4.2.4-r2"
All xen-tools 4.3 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose
">=app-emulations/xen-tools-4.3.2-r2"
All xen-tools 4.2 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose
">=app-emulations/xen-tools-4.2.4-r2"
All Xen PVGRUB 4.3 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-emulations/xen-pvgrub-4.3.2"
All Xen PVGRUB 4.2 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-emulations/xen-pvgrub-4.2.4"
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Gentoo | any | all | app-emulations/xen | < 4.3.2-r4 | UNKNOWN |
Gentoo | any | all | app-emulations/xen-tools | < 4.3.2-r5 | UNKNOWN |
Gentoo | any | all | app-emulations/xen-pvgrub | < 4.3.2 | UNKNOWN |