First published: Tue Jul 05 2022(Updated: )
Last updated 18 February 2025
Credit: security@xen.org security@xen.org security@xen.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fedora | =35 | |
Fedora | =36 | |
Debian | =10.0 | |
Debian | =11.0 | |
Linux Kernel | >=2.6.13<4.9.322 | |
Linux Kernel | >=4.14<4.14.287 | |
Linux Kernel | >=4.19<4.19.251 | |
Linux Kernel | >=5.4<5.4.204 | |
Linux Kernel | >=5.10<5.10.129 | |
Linux Kernel | >=5.15<5.15.53 | |
Linux Kernel | >=5.18<5.18.10 | |
Linux Kernel | =2.6.12-rc2 | |
Linux Kernel | =2.6.12-rc3 | |
Linux Kernel | =2.6.12-rc4 | |
Linux Kernel | =2.6.12-rc5 | |
Linux Kernel | =2.6.12-rc6 | |
Linux Kernel | =5.19-rc1 | |
Linux Kernel | =5.19-rc2 | |
Linux Kernel | =5.19-rc3 | |
Linux Kernel | =5.19-rc4 | |
Linux Kernel | =5.19-rc5 | |
Xen XAPI | ||
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 | |
debian/xen | <=4.14.6-1<=4.14.5+94-ge49571868d-1 | 4.17.3+10-g091466ba55-1~deb12u1 4.17.5+23-ga4e5191dc0-1 4.19.1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-33742 has been classified as a medium severity vulnerability due to the potential for unauthorized memory access.
To mitigate CVE-2022-33742, it's recommended to update to the latest patched versions of the affected Linux distributions or kernels.
CVE-2022-33742 affects multiple versions of the Linux kernel, including 2.6.12-rc2 to 5.19-rc5 and specific distributions like Fedora 35 and 36, and Debian 10.0 and 11.0.
Systems using Linux Block and Network PV device frontends are impacted by CVE-2022-33742, which may leak sensitive data.
CVE-2022-33742 is considered to have potential for local exploitation, but it could lead to data leaks under specific circumstances.