ID

VAR-202203-0043


CVE

CVE-2022-0847


TITLE

Linux Kernel  Initialization vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-007117

DESCRIPTION

A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system. Linux Kernel Has an initialization vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. CVE-2021-43976 Zekun Shen and Brendan Dolan-Gavitt discovered a flaw in the mwifiex_usb_recv() function of the Marvell WiFi-Ex USB Driver. CVE-2022-24448 Lyu Tao reported a flaw in the NFS implementation in the Linux kernel when handling requests to open a directory on a regular file, which could result in a information leak. CVE-2022-25258 Szymon Heidrich reported the USB Gadget subsystem lacks certain validation of interface OS descriptor requests, resulting in memory corruption. CVE-2022-25375 Szymon Heidrich reported that the RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command, resulting in information leak from kernel memory. For the stable distribution (bullseye), these problems have been fixed in version 5.10.92-2. For the detailed security status of linux please refer to its security tracker page at: https://security-tracker.debian.org/tracker/linux Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmImAChfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0TlAw/+MoL+9zYTlpPOcWp0YMuOkEUJU3WS7udSyTSZLNZsWuQTVmPQ6ed7Fxw/ b0j6OCX9HbrIl4nJdx+7D53ujWC6hS29TLgHCb8d/TEeluXPVI2+4Nt1FcZbSXTJ 6hBNIVVIiDUV9Wco8JUVbvk+y8VCsHxqDEePpEOTZVYLyDUUdti4V7+3ZyO8XQ4/ ePeCX8QQba5FApsz4jG7CkBCxBxyley6YswPV3Zz1FF6L/hGjgluYiKFbO4mLTlX vqwv/UIAZl2rutHzzxyBE5hIlPGXfgksPI7jTmSMRkWI99cIlJWTlziecYLQUiid 2NwOyu2vrut6ZVbtmI5WbTy64Aa9EKguQLd+SbBMuK790nfTLRySaZnU52/1j1MW 1/3Nwq+pDbZ/yAAeV/TS9oKl3mG3XVOO34EGpr9A5aZzCPetyb1TQj0jR5+mjCxy RTxYZuCrisnFvVXXRZLPc1vPcZW+ULXrPQFWEEvd2WKRa6iIkDHf5ef8pHRm36mk 9Yt0x6UmmVWLRRZp7UCbD03NB5p3oJKi+i1h3d+19jQGwU2bEhfOEADCADqlZLwc /6vFZ7TrA/74LXM8MOc5+VQbxL8nGetenPSHuxNwoeXw1ry4+x9KV6YHMqeqQ/qW jFpIOfWS1HQ9vC9t46V2eE0sfrOu2Jvdm4MixwRbXhjzs/REYTY= =MIhw -----END PGP SIGNATURE----- . Summary: The Migration Toolkit for Containers (MTC) 1.5.4 is now available. Description: The Migration Toolkit for Containers (MTC) enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Bugs fixed (https://bugzilla.redhat.com/): 1995656 - CVE-2021-36221 golang: net/http/httputil: panic due to racy read of persistConn after handler panic 5. This update provides security fixes, bug fixes, and updates the container images. Description: Red Hat Advanced Cluster Management for Kubernetes 2.4.3 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release: https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/ Security updates: * golang.org/x/crypto: empty plaintext packet causes panic (CVE-2021-43565) * nats-server: misusing the "dynamically provisioned sandbox accounts" feature authenticated user can obtain the privileges of the System account (CVE-2022-24450) * nanoid: Information disclosure via valueOf() function (CVE-2021-23566) * nodejs-shelljs: improper privilege management (CVE-2022-0144) * search-ui-container: follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor (CVE-2022-0155) * node-fetch: exposure of sensitive information to an unauthorized actor (CVE-2022-0235) * follow-redirects: Exposure of Sensitive Information via Authorization Header leak (CVE-2022-0536) * openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778) * imgcrypt: Unauthorized access to encryted container image on a shared system due to missing check in CheckAuthorization() code path (CVE-2022-24778) * golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191) * opencontainers: OCI manifest and index parsing confusion (CVE-2021-41190) Related bugs: * RHACM 2.4.3 image files (BZ #2057249) * Observability - dashboard name contains `/` would cause error when generating dashboard cm (BZ #2032128) * ACM application placement fails after renaming the application name (BZ #2033051) * Disable the obs metric collect should not impact the managed cluster upgrade (BZ #2039197) * Observability - cluster list should only contain OCP311 cluster on OCP311 dashboard (BZ #2039820) * The value of name label changed from clusterclaim name to cluster name (BZ #2042223) * VMWare Cluster creation does not accept ecdsa-sha2-nistp521 ssh keys (BZ #2048500) * clusterSelector matchLabels spec are cleared when changing app name/namespace during creating an app in UI (BZ #2053211) * Application cluster status is not updated in UI after restoring (BZ #2053279) * OpenStack cluster creation is using deprecated floating IP config for 4.7+ (BZ #2056610) * The value of Vendor reported by cluster metrics was Other even if the vendor label in managedcluster was Openshift (BZ #2059039) * Subscriptions stop reconciling after channel secrets are recreated (BZ #2059954) * Placementrule is not reconciling on a new fresh environment (BZ #2074156) * The cluster claimed from clusterpool cannot auto imported (BZ #2074543) 3. Bugs fixed (https://bugzilla.redhat.com/): 2024938 - CVE-2021-41190 opencontainers: OCI manifest and index parsing confusion 2030787 - CVE-2021-43565 golang.org/x/crypto: empty plaintext packet causes panic 2032128 - Observability - dashboard name contains `/` would cause error when generating dashboard cm 2033051 - ACM application placement fails after renaming the application name 2039197 - disable the obs metric collect should not impact the managed cluster upgrade 2039820 - Observability - cluster list should only contain OCP311 cluster on OCP311 dashboard 2042223 - the value of name label changed from clusterclaim name to cluster name 2043535 - CVE-2022-0144 nodejs-shelljs: improper privilege management 2044556 - CVE-2022-0155 follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor 2044591 - CVE-2022-0235 node-fetch: exposure of sensitive information to an unauthorized actor 2048500 - VMWare Cluster creation does not accept ecdsa-sha2-nistp521 ssh keys 2050853 - CVE-2021-23566 nanoid: Information disclosure via valueOf() function 2052573 - CVE-2022-24450 nats-server: misusing the "dynamically provisioned sandbox accounts" feature authenticated user can obtain the privileges of the System account 2053211 - clusterSelector matchLabels spec are cleared when changing app name/namespace during creating an app in UI 2053259 - CVE-2022-0536 follow-redirects: Exposure of Sensitive Information via Authorization Header leak 2053279 - Application cluster status is not updated in UI after restoring 2056610 - OpenStack cluster creation is using deprecated floating IP config for 4.7+ 2057249 - RHACM 2.4.3 images 2059039 - The value of Vendor reported by cluster metrics was Other even if the vendor label in managedcluster was Openshift 2059954 - Subscriptions stop reconciling after channel secrets are recreated 2062202 - CVE-2022-0778 openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates 2064702 - CVE-2022-27191 golang: crash in a golang.org/x/crypto/ssh server 2069368 - CVE-2022-24778 imgcrypt: Unauthorized access to encryted container image on a shared system due to missing check in CheckAuthorization() code path 2074156 - Placementrule is not reconciling on a new fresh environment 2074543 - The cluster claimed from clusterpool can not auto imported 5. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release: https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.3/html/release_notes/ Security updates: * nanoid: Information disclosure via valueOf() function (CVE-2021-23566) * nodejs-shelljs: improper privilege management (CVE-2022-0144) * follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor (CVE-2022-0155) * node-fetch: exposure of sensitive information to an unauthorized actor (CVE-2022-0235) * follow-redirects: Exposure of Sensitive Information via Authorization Header leak (CVE-2022-0536) Bug fix: * RHACM 2.3.8 images (Bugzilla #2062316) 3. Bugs fixed (https://bugzilla.redhat.com/): 2043535 - CVE-2022-0144 nodejs-shelljs: improper privilege management 2044556 - CVE-2022-0155 follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor 2044591 - CVE-2022-0235 node-fetch: exposure of sensitive information to an unauthorized actor 2050853 - CVE-2021-23566 nanoid: Information disclosure via valueOf() function 2053259 - CVE-2022-0536 follow-redirects: Exposure of Sensitive Information via Authorization Header leak 2062316 - RHACM 2.3.8 images 5. ========================================================================= Ubuntu Security Notice USN-5362-1 April 01, 2022 linux-intel-5.13 vulnerabilities ========================================================================= A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-intel-5.13: Linux kernel for Intel IOTG Details: Nick Gregory discovered that the Linux kernel incorrectly handled network offload functionality. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2022-25636) Enrico Barberis, Pietro Frigo, Marius Muench, Herbert Bos, and Cristiano Giuffrida discovered that hardware mitigations added by ARM to their processors to address Spectre-BTI were insufficient. A local attacker could potentially use this to expose sensitive information. (CVE-2022-23960) It was discovered that the BPF verifier in the Linux kernel did not properly restrict pointer types in certain situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-23222) Max Kellermann discovered that the Linux kernel incorrectly handled Unix pipes. A local attacker could potentially use this to modify any file that could be opened for reading. (CVE-2022-0847) Yiqi Sun and Kevin Wang discovered that the cgroups implementation in the Linux kernel did not properly restrict access to the cgroups v1 release_agent feature. A local attacker could use this to gain administrative privileges. (CVE-2022-0492) William Liu and Jamie Hill-Daniel discovered that the file system context functionality in the Linux kernel contained an integer underflow vulnerability, leading to an out-of-bounds write. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-0185) Enrico Barberis, Pietro Frigo, Marius Muench, Herbert Bos, and Cristiano Giuffrida discovered that hardware mitigations added by Intel to their processors to address Spectre-BTI were insufficient. A local attacker could potentially use this to expose sensitive information. (CVE-2022-0001) Jann Horn discovered a race condition in the Unix domain socket implementation in the Linux kernel that could result in a read-after-free. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-4083) It was discovered that the NFS server implementation in the Linux kernel contained an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-4090) Kirill Tkhai discovered that the XFS file system implementation in the Linux kernel did not calculate size correctly when pre-allocating space in some situations. A local attacker could use this to expose sensitive information. (CVE-2021-4155) It was discovered that the AMD Radeon GPU driver in the Linux kernel did not properly validate writes in the debugfs file system. A privileged attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-42327) Sushma Venkatesh Reddy discovered that the Intel i915 graphics driver in the Linux kernel did not perform a GPU TLB flush in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2022-0330) Samuel Page discovered that the Transparent Inter-Process Communication (TIPC) protocol implementation in the Linux kernel contained a stack-based buffer overflow. A remote attacker could use this to cause a denial of service (system crash) for systems that have a TIPC bearer configured. (CVE-2022-0435) It was discovered that the KVM implementation for s390 systems in the Linux kernel did not properly prevent memory operations on PVM guests that were in non-protected mode. A local attacker could use this to obtain unauthorized memory write access. (CVE-2022-0516) It was discovered that the ICMPv6 implementation in the Linux kernel did not properly deallocate memory in certain situations. A remote attacker could possibly use this to cause a denial of service (memory exhaustion). (CVE-2022-0742) It was discovered that the VMware Virtual GPU driver in the Linux kernel did not properly handle certain failure conditions, leading to a stale entry in the file descriptor table. A local attacker could use this to expose sensitive information or possibly gain administrative privileges. (CVE-2022-22942) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: linux-image-5.13.0-1010-intel 5.13.0-1010.10 linux-image-intel 5.13.0.1010.11 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5362-1 CVE-2021-4083, CVE-2021-4090, CVE-2021-4155, CVE-2021-42327, CVE-2022-0001, CVE-2022-0185, CVE-2022-0330, CVE-2022-0435, CVE-2022-0492, CVE-2022-0516, CVE-2022-0742, CVE-2022-0847, CVE-2022-22942, CVE-2022-23222, CVE-2022-23960, CVE-2022-25636 Package Information: https://launchpad.net/ubuntu/+source/linux-intel-5.13/5.13.0-1010.10 . These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. 8.1) - aarch64, noarch, ppc64le, s390x, x86_64 3. Bugs fixed (https://bugzilla.redhat.com/): 2027201 - CVE-2021-4028 kernel: use-after-free in RDMA listen() 2029923 - CVE-2021-4083 kernel: fget: check that the fd still exists after getting a ref to it 2031930 - CVE-2021-0920 kernel: Use After Free in unix_gc() which could result in a local privilege escalation 2042404 - CVE-2022-0330 kernel: possible privileges escalation due to missing TLB flush 2044809 - CVE-2022-22942 kernel: failing usercopy allows for use-after-free exploitation 2051505 - CVE-2022-0492 kernel: cgroups v1 release_agent feature may allow privilege escalation 2060795 - CVE-2022-0847 kernel: improper initialization of the "flags" member of the new pipe_buffer 6. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security update Advisory ID: RHSA-2022:0831-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2022:0831 Issue date: 2022-03-10 CVE Names: CVE-2022-0847 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat CodeReady Linux Builder EUS (v. 8.4) - aarch64, ppc64le, x86_64 Red Hat Enterprise Linux BaseOS EUS (v.8.4) - aarch64, noarch, ppc64le, s390x, x86_64 3. Security Fix(es): * kernel: improper initialization of the "flags" member of the new pipe_buffer (CVE-2022-0847) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Package List: Red Hat Enterprise Linux BaseOS EUS (v.8.4): Source: kernel-4.18.0-305.40.2.el8_4.src.rpm aarch64: bpftool-4.18.0-305.40.2.el8_4.aarch64.rpm bpftool-debuginfo-4.18.0-305.40.2.el8_4.aarch64.rpm kernel-4.18.0-305.40.2.el8_4.aarch64.rpm kernel-core-4.18.0-305.40.2.el8_4.aarch64.rpm kernel-cross-headers-4.18.0-305.40.2.el8_4.aarch64.rpm kernel-debug-4.18.0-305.40.2.el8_4.aarch64.rpm kernel-debug-core-4.18.0-305.40.2.el8_4.aarch64.rpm kernel-debug-debuginfo-4.18.0-305.40.2.el8_4.aarch64.rpm kernel-debug-devel-4.18.0-305.40.2.el8_4.aarch64.rpm kernel-debug-modules-4.18.0-305.40.2.el8_4.aarch64.rpm kernel-debug-modules-extra-4.18.0-305.40.2.el8_4.aarch64.rpm kernel-debuginfo-4.18.0-305.40.2.el8_4.aarch64.rpm kernel-debuginfo-common-aarch64-4.18.0-305.40.2.el8_4.aarch64.rpm kernel-devel-4.18.0-305.40.2.el8_4.aarch64.rpm kernel-headers-4.18.0-305.40.2.el8_4.aarch64.rpm kernel-modules-4.18.0-305.40.2.el8_4.aarch64.rpm kernel-modules-extra-4.18.0-305.40.2.el8_4.aarch64.rpm kernel-tools-4.18.0-305.40.2.el8_4.aarch64.rpm kernel-tools-debuginfo-4.18.0-305.40.2.el8_4.aarch64.rpm kernel-tools-libs-4.18.0-305.40.2.el8_4.aarch64.rpm perf-4.18.0-305.40.2.el8_4.aarch64.rpm perf-debuginfo-4.18.0-305.40.2.el8_4.aarch64.rpm python3-perf-4.18.0-305.40.2.el8_4.aarch64.rpm python3-perf-debuginfo-4.18.0-305.40.2.el8_4.aarch64.rpm noarch: kernel-abi-stablelists-4.18.0-305.40.2.el8_4.noarch.rpm kernel-doc-4.18.0-305.40.2.el8_4.noarch.rpm ppc64le: bpftool-4.18.0-305.40.2.el8_4.ppc64le.rpm bpftool-debuginfo-4.18.0-305.40.2.el8_4.ppc64le.rpm kernel-4.18.0-305.40.2.el8_4.ppc64le.rpm kernel-core-4.18.0-305.40.2.el8_4.ppc64le.rpm kernel-cross-headers-4.18.0-305.40.2.el8_4.ppc64le.rpm kernel-debug-4.18.0-305.40.2.el8_4.ppc64le.rpm kernel-debug-core-4.18.0-305.40.2.el8_4.ppc64le.rpm kernel-debug-debuginfo-4.18.0-305.40.2.el8_4.ppc64le.rpm kernel-debug-devel-4.18.0-305.40.2.el8_4.ppc64le.rpm kernel-debug-modules-4.18.0-305.40.2.el8_4.ppc64le.rpm kernel-debug-modules-extra-4.18.0-305.40.2.el8_4.ppc64le.rpm kernel-debuginfo-4.18.0-305.40.2.el8_4.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.18.0-305.40.2.el8_4.ppc64le.rpm kernel-devel-4.18.0-305.40.2.el8_4.ppc64le.rpm kernel-headers-4.18.0-305.40.2.el8_4.ppc64le.rpm kernel-modules-4.18.0-305.40.2.el8_4.ppc64le.rpm kernel-modules-extra-4.18.0-305.40.2.el8_4.ppc64le.rpm kernel-tools-4.18.0-305.40.2.el8_4.ppc64le.rpm kernel-tools-debuginfo-4.18.0-305.40.2.el8_4.ppc64le.rpm kernel-tools-libs-4.18.0-305.40.2.el8_4.ppc64le.rpm perf-4.18.0-305.40.2.el8_4.ppc64le.rpm perf-debuginfo-4.18.0-305.40.2.el8_4.ppc64le.rpm python3-perf-4.18.0-305.40.2.el8_4.ppc64le.rpm python3-perf-debuginfo-4.18.0-305.40.2.el8_4.ppc64le.rpm s390x: bpftool-4.18.0-305.40.2.el8_4.s390x.rpm bpftool-debuginfo-4.18.0-305.40.2.el8_4.s390x.rpm kernel-4.18.0-305.40.2.el8_4.s390x.rpm kernel-core-4.18.0-305.40.2.el8_4.s390x.rpm kernel-cross-headers-4.18.0-305.40.2.el8_4.s390x.rpm kernel-debug-4.18.0-305.40.2.el8_4.s390x.rpm kernel-debug-core-4.18.0-305.40.2.el8_4.s390x.rpm kernel-debug-debuginfo-4.18.0-305.40.2.el8_4.s390x.rpm kernel-debug-devel-4.18.0-305.40.2.el8_4.s390x.rpm kernel-debug-modules-4.18.0-305.40.2.el8_4.s390x.rpm kernel-debug-modules-extra-4.18.0-305.40.2.el8_4.s390x.rpm kernel-debuginfo-4.18.0-305.40.2.el8_4.s390x.rpm kernel-debuginfo-common-s390x-4.18.0-305.40.2.el8_4.s390x.rpm kernel-devel-4.18.0-305.40.2.el8_4.s390x.rpm kernel-headers-4.18.0-305.40.2.el8_4.s390x.rpm kernel-modules-4.18.0-305.40.2.el8_4.s390x.rpm kernel-modules-extra-4.18.0-305.40.2.el8_4.s390x.rpm kernel-tools-4.18.0-305.40.2.el8_4.s390x.rpm kernel-tools-debuginfo-4.18.0-305.40.2.el8_4.s390x.rpm kernel-zfcpdump-4.18.0-305.40.2.el8_4.s390x.rpm kernel-zfcpdump-core-4.18.0-305.40.2.el8_4.s390x.rpm kernel-zfcpdump-debuginfo-4.18.0-305.40.2.el8_4.s390x.rpm kernel-zfcpdump-devel-4.18.0-305.40.2.el8_4.s390x.rpm kernel-zfcpdump-modules-4.18.0-305.40.2.el8_4.s390x.rpm kernel-zfcpdump-modules-extra-4.18.0-305.40.2.el8_4.s390x.rpm perf-4.18.0-305.40.2.el8_4.s390x.rpm perf-debuginfo-4.18.0-305.40.2.el8_4.s390x.rpm python3-perf-4.18.0-305.40.2.el8_4.s390x.rpm python3-perf-debuginfo-4.18.0-305.40.2.el8_4.s390x.rpm x86_64: bpftool-4.18.0-305.40.2.el8_4.x86_64.rpm bpftool-debuginfo-4.18.0-305.40.2.el8_4.x86_64.rpm kernel-4.18.0-305.40.2.el8_4.x86_64.rpm kernel-core-4.18.0-305.40.2.el8_4.x86_64.rpm kernel-cross-headers-4.18.0-305.40.2.el8_4.x86_64.rpm kernel-debug-4.18.0-305.40.2.el8_4.x86_64.rpm kernel-debug-core-4.18.0-305.40.2.el8_4.x86_64.rpm kernel-debug-debuginfo-4.18.0-305.40.2.el8_4.x86_64.rpm kernel-debug-devel-4.18.0-305.40.2.el8_4.x86_64.rpm kernel-debug-modules-4.18.0-305.40.2.el8_4.x86_64.rpm kernel-debug-modules-extra-4.18.0-305.40.2.el8_4.x86_64.rpm kernel-debuginfo-4.18.0-305.40.2.el8_4.x86_64.rpm kernel-debuginfo-common-x86_64-4.18.0-305.40.2.el8_4.x86_64.rpm kernel-devel-4.18.0-305.40.2.el8_4.x86_64.rpm kernel-headers-4.18.0-305.40.2.el8_4.x86_64.rpm kernel-modules-4.18.0-305.40.2.el8_4.x86_64.rpm kernel-modules-extra-4.18.0-305.40.2.el8_4.x86_64.rpm kernel-tools-4.18.0-305.40.2.el8_4.x86_64.rpm kernel-tools-debuginfo-4.18.0-305.40.2.el8_4.x86_64.rpm kernel-tools-libs-4.18.0-305.40.2.el8_4.x86_64.rpm perf-4.18.0-305.40.2.el8_4.x86_64.rpm perf-debuginfo-4.18.0-305.40.2.el8_4.x86_64.rpm python3-perf-4.18.0-305.40.2.el8_4.x86_64.rpm python3-perf-debuginfo-4.18.0-305.40.2.el8_4.x86_64.rpm Red Hat CodeReady Linux Builder EUS (v. 8.4): aarch64: bpftool-debuginfo-4.18.0-305.40.2.el8_4.aarch64.rpm kernel-debug-debuginfo-4.18.0-305.40.2.el8_4.aarch64.rpm kernel-debuginfo-4.18.0-305.40.2.el8_4.aarch64.rpm kernel-debuginfo-common-aarch64-4.18.0-305.40.2.el8_4.aarch64.rpm kernel-tools-debuginfo-4.18.0-305.40.2.el8_4.aarch64.rpm kernel-tools-libs-devel-4.18.0-305.40.2.el8_4.aarch64.rpm perf-debuginfo-4.18.0-305.40.2.el8_4.aarch64.rpm python3-perf-debuginfo-4.18.0-305.40.2.el8_4.aarch64.rpm ppc64le: bpftool-debuginfo-4.18.0-305.40.2.el8_4.ppc64le.rpm kernel-debug-debuginfo-4.18.0-305.40.2.el8_4.ppc64le.rpm kernel-debuginfo-4.18.0-305.40.2.el8_4.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.18.0-305.40.2.el8_4.ppc64le.rpm kernel-tools-debuginfo-4.18.0-305.40.2.el8_4.ppc64le.rpm kernel-tools-libs-devel-4.18.0-305.40.2.el8_4.ppc64le.rpm perf-debuginfo-4.18.0-305.40.2.el8_4.ppc64le.rpm python3-perf-debuginfo-4.18.0-305.40.2.el8_4.ppc64le.rpm x86_64: bpftool-debuginfo-4.18.0-305.40.2.el8_4.x86_64.rpm kernel-debug-debuginfo-4.18.0-305.40.2.el8_4.x86_64.rpm kernel-debuginfo-4.18.0-305.40.2.el8_4.x86_64.rpm kernel-debuginfo-common-x86_64-4.18.0-305.40.2.el8_4.x86_64.rpm kernel-tools-debuginfo-4.18.0-305.40.2.el8_4.x86_64.rpm kernel-tools-libs-devel-4.18.0-305.40.2.el8_4.x86_64.rpm perf-debuginfo-4.18.0-305.40.2.el8_4.x86_64.rpm python3-perf-debuginfo-4.18.0-305.40.2.el8_4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYippG9zjgjWX9erEAQhhcQ//e2QeP7jVbPrt2PC8zaKCv70XWm72lirL zkeTThnwK1QZY2wcO5ajbpwzdZsIXdjN9C3tjJhqUzdYDBwNd2di3SSUYyIwh7pp 7uarwoGONPU5bnQo9BURzl+9DD6/hDEVuMEF/tuAAf0xaOr6UyacUY6yavDJeas1 fcZxFlMA8V19xXmxazdOlt+0SSn6TtOvfd8fr+Os03JrkpMGUzZCatm4KsqslnLS o2dnIXhMYGchB77ZUcEqQAPZkMntYBfDIvWa8m98qZUQyucL6x3M/kXcV08Vcus0 9Aasg/ojP98V60W43AEFzarclGyS7aPCq+/DIxvXlgtK31N1XtOBbAKBVXkkq9n9 zkFEOmm9RATsUQ2I9yc341AQ9+/QtyiZxtNYlGIPjPmVpOYmZ4mBpZfYOum0tfHg aXJbbrf4LkhEtCY6qOKzTIjRTuBbv9jnlxGb96pmtKZGiBoWdeOVZ7i+fHfMuziG WpJgIY1fyn4xqdJATqMIdArhZX+rl8K5uY1NbbhEpNAn4ZuPzzg+eKX+MeYcIcnR Rm7h0WSCd8SgRRzoGxhjEi2c/JR1We61JTHE/uvrmYxIPxg3dkQA0oa9FX+r4i83 +W3FBOS8V5wKfRjPvt7qpZLA4m9BUcFvoHHhBuDvUXOATOPtFyBWsSSWb9OoWT/C 4X8tFOrrkAk= =XTP9 -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 2.43

sources: NVD: CVE-2022-0847 // JVNDB: JVNDB-2022-007117 // VULMON: CVE-2022-0847 // PACKETSTORM: 169268 // PACKETSTORM: 166789 // PACKETSTORM: 166812 // PACKETSTORM: 166516 // PACKETSTORM: 166569 // PACKETSTORM: 166305 // PACKETSTORM: 166281 // PACKETSTORM: 166265

AFFECTED PRODUCTS

vendor:linuxmodel:kernelscope:gteversion:5.8

Trust: 1.0

vendor:netappmodel:h700sscope:eqversion: -

Trust: 1.0

vendor:netappmodel:h500escope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linux for ibm z systems eusscope:eqversion:8.2

Trust: 1.0

vendor:redhatmodel:enterprise linux for ibm z systems eusscope:eqversion:8.4

Trust: 1.0

vendor:ovirtmodel:ovirt-enginescope:eqversion:4.4.10.2

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:5.16.11

Trust: 1.0

vendor:redhatmodel:enterprise linux for real time for nfv tusscope:eqversion:8.2

Trust: 1.0

vendor:redhatmodel:enterprise linux for real time for nfv tusscope:eqversion:8.4

Trust: 1.0

vendor:netappmodel:h300sscope:eqversion: -

Trust: 1.0

vendor:netappmodel:h300escope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linux for power little endianscope:eqversion:8.0

Trust: 1.0

vendor:redhatmodel:enterprise linux for real time tusscope:eqversion:8.2

Trust: 1.0

vendor:redhatmodel:enterprise linux for real time tusscope:eqversion:8.4

Trust: 1.0

vendor:redhatmodel:codeready linux builderscope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:8.2

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:8.4

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:8.2

Trust: 1.0

vendor:redhatmodel:enterprise linux for real timescope:eqversion:8

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:8.4

Trust: 1.0

vendor:redhatmodel:enterprise linux for real time for nfvscope:eqversion:8

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:5.16

Trust: 1.0

vendor:netappmodel:h500sscope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:8.0

Trust: 1.0

vendor:redhatmodel:enterprise linux for ibm z systemsscope:eqversion:8.0

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:5.15.25

Trust: 1.0

vendor:siemensmodel:scalance lpe9403scope:ltversion:2.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server update services for sap solutionsscope:eqversion:8.2

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:35

Trust: 1.0

vendor:netappmodel:h410sscope:eqversion: -

Trust: 1.0

vendor:sonicwallmodel:sma1000scope:lteversion:12.4.2-02044

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:5.15

Trust: 1.0

vendor:redhatmodel:enterprise linux server update services for sap solutionsscope:eqversion:8.4

Trust: 1.0

vendor:redhatmodel:enterprise linux server for power little endian update services for sap solutionsscope:eqversion:8.2

Trust: 1.0

vendor:redhatmodel:enterprise linux server for power little endian update services for sap solutionsscope:eqversion:8.4

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:5.10.102

Trust: 1.0

vendor:redhatmodel:enterprise linux server update services for sap solutionsscope:eqversion:8.1

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:8.2

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:8.4

Trust: 1.0

vendor:redhatmodel:enterprise linux server for power little endian update services for sap solutionsscope:eqversion:8.1

Trust: 1.0

vendor:redhatmodel:enterprise linux for power little endian eusscope:eqversion:8.2

Trust: 1.0

vendor:redhatmodel:enterprise linux for power little endian eusscope:eqversion:8.4

Trust: 1.0

vendor:netappmodel:h410cscope:eqversion: -

Trust: 1.0

vendor:redhatmodel:virtualization hostscope:eqversion:4.0

Trust: 1.0

vendor:netappmodel:h700escope:eqversion: -

Trust: 1.0

vendor:fedoramodel:fedorascope: - version: -

Trust: 0.8

vendor:sonicwallmodel:sma1000scope: - version: -

Trust: 0.8

vendor:レッドハットmodel:red hat enterprise linux eusscope: - version: -

Trust: 0.8

vendor:netappmodel:h300sscope: - version: -

Trust: 0.8

vendor:ovirtmodel:ovirt-enginescope: - version: -

Trust: 0.8

vendor:レッドハットmodel:red hat enterprise linux for ibm z systems - extended update supportscope: - version: -

Trust: 0.8

vendor:レッドハットmodel:red hat enterprise linux for ibm z systemsscope: - version: -

Trust: 0.8

vendor:linuxmodel:kernelscope: - version: -

Trust: 0.8

vendor:レッドハットmodel:red hat enterprise linuxscope: - version: -

Trust: 0.8

vendor:シーメンスmodel:scalance lpe9403scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-007117 // NVD: CVE-2022-0847

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-0847
value: HIGH

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2022-0847
value: HIGH

Trust: 1.0

NVD: CVE-2022-0847
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202203-522
value: HIGH

Trust: 0.6

VULMON: CVE-2022-0847
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2022-0847
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

nvd@nist.gov: CVE-2022-0847
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 2.0

NVD: CVE-2022-0847
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULMON: CVE-2022-0847 // CNNVD: CNNVD-202203-522 // JVNDB: JVNDB-2022-007117 // NVD: CVE-2022-0847 // NVD: CVE-2022-0847

PROBLEMTYPE DATA

problemtype:CWE-665

Trust: 1.0

problemtype:Improper initialization (CWE-665) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-007117 // NVD: CVE-2022-0847

THREAT TYPE

local

Trust: 0.7

sources: PACKETSTORM: 166569 // CNNVD: CNNVD-202203-522

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202203-522

PATCH

title:Bug 2060795url:https://fedoraproject.org/

Trust: 0.8

title:Linux kernel Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=184957

Trust: 0.6

title:Red Hat: Important: kernel-rt security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20220822 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20220831 - Security Advisory

Trust: 0.1

title:Red Hat: url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2022-0847

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2022-0847

Trust: 0.1

title:Dirty-Pipe-Oneshoturl:https://github.com/badboy-sft/Dirty-Pipe-Oneshot

Trust: 0.1

sources: VULMON: CVE-2022-0847 // CNNVD: CNNVD-202203-522 // JVNDB: JVNDB-2022-007117

EXTERNAL IDS

db:NVDid:CVE-2022-0847

Trust: 4.1

db:PACKETSTORMid:166229

Trust: 2.4

db:PACKETSTORMid:166258

Trust: 2.4

db:PACKETSTORMid:166230

Trust: 2.4

db:SIEMENSid:SSA-222547

Trust: 1.6

db:ICS CERTid:ICSA-22-167-09

Trust: 1.4

db:PACKETSTORMid:176534

Trust: 1.0

db:JVNid:JVNVU99030761

Trust: 0.8

db:JVNDBid:JVNDB-2022-007117

Trust: 0.8

db:PACKETSTORMid:166812

Trust: 0.7

db:PACKETSTORMid:166516

Trust: 0.7

db:PACKETSTORMid:166569

Trust: 0.7

db:PACKETSTORMid:166305

Trust: 0.7

db:PACKETSTORMid:166241

Trust: 0.6

db:PACKETSTORMid:166280

Trust: 0.6

db:CS-HELPid:SB2022032843

Trust: 0.6

db:CS-HELPid:SB2022031421

Trust: 0.6

db:CS-HELPid:SB2022030808

Trust: 0.6

db:CS-HELPid:SB2022042576

Trust: 0.6

db:CS-HELPid:SB2022031308

Trust: 0.6

db:CS-HELPid:SB2022031036

Trust: 0.6

db:AUSCERTid:ESB-2022.1027

Trust: 0.6

db:AUSCERTid:ESB-2022.0965

Trust: 0.6

db:AUSCERTid:ESB-2022.2981

Trust: 0.6

db:AUSCERTid:ESB-2022.1677

Trust: 0.6

db:AUSCERTid:ESB-2022.1405

Trust: 0.6

db:AUSCERTid:ESB-2022.1064

Trust: 0.6

db:AUSCERTid:ESB-2022.0944

Trust: 0.6

db:CXSECURITYid:WLB-2022030042

Trust: 0.6

db:CXSECURITYid:WLB-2022030060

Trust: 0.6

db:EXPLOIT-DBid:50808

Trust: 0.6

db:CNNVDid:CNNVD-202203-522

Trust: 0.6

db:VULMONid:CVE-2022-0847

Trust: 0.1

db:PACKETSTORMid:169268

Trust: 0.1

db:PACKETSTORMid:166789

Trust: 0.1

db:PACKETSTORMid:166281

Trust: 0.1

db:PACKETSTORMid:166265

Trust: 0.1

sources: VULMON: CVE-2022-0847 // PACKETSTORM: 169268 // PACKETSTORM: 166789 // PACKETSTORM: 166812 // PACKETSTORM: 166516 // PACKETSTORM: 166569 // PACKETSTORM: 166305 // PACKETSTORM: 166281 // PACKETSTORM: 166265 // CNNVD: CNNVD-202203-522 // JVNDB: JVNDB-2022-007117 // NVD: CVE-2022-0847

REFERENCES

url:http://packetstormsecurity.com/files/166258/dirty-pipe-local-privilege-escalation.html

Trust: 3.0

url:http://packetstormsecurity.com/files/166229/dirty-pipe-linux-privilege-escalation.html

Trust: 3.0

url:http://packetstormsecurity.com/files/166230/dirty-pipe-suid-binary-hijack-privilege-escalation.html

Trust: 2.4

url:https://dirtypipe.cm4all.com/

Trust: 1.6

url:https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf

Trust: 1.6

url:https://psirt.global.sonicwall.com/vuln-detail/snwlid-2022-0015

Trust: 1.6

url:https://www.suse.com/support/kb/doc/?id=000020603

Trust: 1.6

url:https://bugzilla.redhat.com/show_bug.cgi?id=2060795

Trust: 1.6

url:https://security.netapp.com/advisory/ntap-20220325-0005/

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2022-0847

Trust: 1.5

url:https://access.redhat.com/security/cve/cve-2022-0847

Trust: 1.2

url:http://packetstormsecurity.com/files/176534/linux-4.20-ktls-read-only-write.html

Trust: 1.0

url:https://jvn.jp/vu/jvnvu99030761/index.html

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-22-167-09

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-0330

Trust: 0.6

url:https://bugzilla.redhat.com/):

Trust: 0.6

url:https://access.redhat.com/security/team/contact/

Trust: 0.6

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.6

url:https://cxsecurity.com/issue/wlb-2022030060

Trust: 0.6

url:https://www.exploit-db.com/exploits/50808

Trust: 0.6

url:https://cxsecurity.com/issue/wlb-2022030042

Trust: 0.6

url:https://packetstormsecurity.com/files/166305/red-hat-security-advisory-2022-0841-01.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022031308

Trust: 0.6

url:https://packetstormsecurity.com/files/166516/red-hat-security-advisory-2022-1083-01.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022032843

Trust: 0.6

url:https://packetstormsecurity.com/files/166241/ubuntu-security-notice-usn-5317-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.1405

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022031036

Trust: 0.6

url:https://packetstormsecurity.com/files/166280/red-hat-security-advisory-2022-0822-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.1027

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022030808

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.1064

Trust: 0.6

url:https://us-cert.cisa.gov/ics/advisories/icsa-22-167-09

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022042576

Trust: 0.6

url:https://packetstormsecurity.com/files/166569/ubuntu-security-notice-usn-5362-1.html

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2022-0847/

Trust: 0.6

url:https://packetstormsecurity.com/files/166812/red-hat-security-advisory-2022-1476-01.html

Trust: 0.6

url:https://vigilance.fr/vulnerability/linux-kernel-file-write-via-dirty-pipe-37724

Trust: 0.6

url:https://source.android.com/security/bulletin/2022-05-01

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0944

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.2981

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0965

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022031421

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.1677

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2022-0435

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2021-0920

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2022-22942

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2022-0330

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2021-0920

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2022-0516

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2022-22942

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2022-0492

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-4154

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2022-0435

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2022-0492

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2022-25315

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-25236

Trust: 0.3

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-25235

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-23308

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-23852

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-22822

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-22823

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-22827

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-0392

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-0261

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2021-31566

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-22826

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-23177

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2021-3999

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-0413

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-23219

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-22824

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2021-45960

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-23218

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-22825

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2021-23177

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2021-46143

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-0516

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-31566

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-0361

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-0359

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-0318

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-4154

Trust: 0.3

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.3

url:https://access.redhat.com/security/team/key/

Trust: 0.3

url:https://access.redhat.com/security/vulnerabilities/rhsb-2022-002

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2021-41190

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-24407

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-0778

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-0536

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-22822

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-0235

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-0392

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-0261

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-3999

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-0155

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-23566

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-0318

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-0359

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-0155

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-46143

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-0413

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-45960

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-0144

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-23566

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-0235

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-0361

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-0536

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-0144

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-4083

Trust: 0.2

url:https://access.redhat.com/articles/11258

Trust: 0.2

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-24448

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-25258

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-24959

Trust: 0.1

url:https://security-tracker.debian.org/tracker/linux

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-43976

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-25375

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-22925

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-19603

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-25710

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-20838

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-21684

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-12762

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-36085

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-16135

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-36084

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-25710

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-20231

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-20232

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-28153

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3445

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-36086

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-4122

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-17594

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-36087

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-22898

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-42574

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-5827

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-19603

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-18218

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-14155

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-13435

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33560

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-16135

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-14155

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-25709

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-17595

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-13751

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3426

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-22817

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3572

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20232

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-20838

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-22925

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-44716

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:1396

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-17594

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-22876

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-13750

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-12762

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3577

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-13435

Trust: 0.1

url:https://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-36221

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-28153

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18218

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-0532

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-22876

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2014-3577

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-22898

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-22816

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3580

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3800

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-21684

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-13751

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-17595

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3200

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-24370

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20231

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-24370

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-5827

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-13750

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3521

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-25709

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-44717

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-41190

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0778

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-0811

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-27191

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:1476

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-24778

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-24450

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-43565

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0811

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-43565

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-22825

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.3/html-single/install/index#installing

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.3/html/release_notes/index

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:1083

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-22823

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-22824

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.3/html/release_notes/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-23960

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0742

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-25636

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5362-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-intel-5.13/5.13.0-1010.10

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4155

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0185

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-42327

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0001

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4090

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-23222

Trust: 0.1

url:https://access.redhat.com/articles/2974891

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-24407

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:0841

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-4083

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-4028

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:0823

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4028

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:0831

Trust: 0.1

sources: PACKETSTORM: 169268 // PACKETSTORM: 166789 // PACKETSTORM: 166812 // PACKETSTORM: 166516 // PACKETSTORM: 166569 // PACKETSTORM: 166305 // PACKETSTORM: 166281 // PACKETSTORM: 166265 // CNNVD: CNNVD-202203-522 // JVNDB: JVNDB-2022-007117 // NVD: CVE-2022-0847

CREDITS

Red Hat

Trust: 0.6

sources: PACKETSTORM: 166789 // PACKETSTORM: 166812 // PACKETSTORM: 166516 // PACKETSTORM: 166305 // PACKETSTORM: 166281 // PACKETSTORM: 166265

SOURCES

db:VULMONid:CVE-2022-0847
db:PACKETSTORMid:169268
db:PACKETSTORMid:166789
db:PACKETSTORMid:166812
db:PACKETSTORMid:166516
db:PACKETSTORMid:166569
db:PACKETSTORMid:166305
db:PACKETSTORMid:166281
db:PACKETSTORMid:166265
db:CNNVDid:CNNVD-202203-522
db:JVNDBid:JVNDB-2022-007117
db:NVDid:CVE-2022-0847

LAST UPDATE DATE

2025-09-13T21:00:06.566000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2022-0847date:2024-01-12T00:00:00
db:CNNVDid:CNNVD-202203-522date:2022-08-11T00:00:00
db:JVNDBid:JVNDB-2022-007117date:2023-07-12T06:29:00
db:NVDid:CVE-2022-0847date:2025-07-30T19:10:07.893

SOURCES RELEASE DATE

db:VULMONid:CVE-2022-0847date:2022-03-10T00:00:00
db:PACKETSTORMid:169268date:2022-03-28T19:12:00
db:PACKETSTORMid:166789date:2022-04-20T15:12:33
db:PACKETSTORMid:166812date:2022-04-21T15:12:25
db:PACKETSTORMid:166516date:2022-03-29T15:53:19
db:PACKETSTORMid:166569date:2022-04-01T15:43:44
db:PACKETSTORMid:166305date:2022-03-14T18:59:34
db:PACKETSTORMid:166281date:2022-03-11T16:39:13
db:PACKETSTORMid:166265date:2022-03-11T16:31:15
db:CNNVDid:CNNVD-202203-522date:2022-03-07T00:00:00
db:JVNDBid:JVNDB-2022-007117date:2023-07-12T00:00:00
db:NVDid:CVE-2022-0847date:2022-03-10T17:44:57.283