First published: Tue Jul 05 2022(Updated: )
Last updated 18 February 2025
Credit: security@xen.org security@xen.org security@xen.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=2.6.13<4.9.322 | |
Linux Kernel | >=4.14<4.14.287 | |
Linux Kernel | >=4.19<4.19.251 | |
Linux Kernel | >=5.4<5.4.204 | |
Linux Kernel | >=5.10<5.10.129 | |
Linux Kernel | >=5.15<5.15.53 | |
Linux Kernel | >=5.18<5.18.10 | |
Linux Kernel | =2.6.12-rc2 | |
Linux Kernel | =2.6.12-rc3 | |
Linux Kernel | =2.6.12-rc4 | |
Linux Kernel | =2.6.12-rc5 | |
Linux Kernel | =2.6.12-rc6 | |
Linux Kernel | =5.19-rc1 | |
Linux Kernel | =5.19-rc2 | |
Linux Kernel | =5.19-rc3 | |
Linux Kernel | =5.19-rc4 | |
Linux Kernel | =5.19-rc5 | |
Xen XAPI | ||
Debian | =10.0 | |
Debian | =11.0 | |
Fedora | =35 | |
Fedora | =36 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 | |
debian/xen | <=4.14.6-1<=4.14.5+94-ge49571868d-1 | 4.17.3+10-g091466ba55-1~deb12u1 4.17.5+23-ga4e5191dc0-1 4.19.1-1 4.20.0-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-26365 is considered a high severity vulnerability due to the potential for data leaks.
To mitigate CVE-2022-26365, update the affected Linux kernel and Xen packages to the latest versions as recommended.
CVE-2022-26365 affects various Linux kernel versions and Xen hypervisor products.
Exploiting CVE-2022-26365 can lead to unauthorized access to sensitive data due to memory disclosure.
No, CVE-2022-26365 is not classified as a remote code execution vulnerability but rather as a data leakage issue.