ID

VAR-202206-1106


CVE

CVE-2022-21123


TITLE

Red Hat Security Advisory 2022-6537-01

Trust: 0.1

sources: PACKETSTORM: 168426

DESCRIPTION

Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. Description: Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. All OpenShift Container Platform 4.11 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html 3. Solution: For OpenShift Container Platform 4.11 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html Details on how to access this content are available at https://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html 4. Bugs fixed (https://bugzilla.redhat.com/): 2045880 - CVE-2022-21698 prometheus/client_golang: Denial of service using InstrumentHandlerCounter 2100495 - CVE-2021-38561 golang: out-of-bounds read in golang.org/x/text/language leads to DoS 5. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: kernel security, bug fix, and enhancement update Advisory ID: RHSA-2022:6983-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2022:6983 Issue date: 2022-10-18 CVE Names: CVE-2021-45485 CVE-2021-45486 CVE-2022-2588 CVE-2022-21123 CVE-2022-21125 CVE-2022-21166 ==================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat CodeReady Linux Builder EUS (v. 8.4) - aarch64, ppc64le, x86_64 Red Hat Enterprise Linux BaseOS EUS (v.8.4) - aarch64, noarch, ppc64le, s390x, x86_64 3. The following packages have been upgraded to a later upstream version: kernel (4.18.0). Security Fix(es): * A use-after-free in cls_route filter implementation may lead to privilege escalation (CVE-2022-2588) * Information leak in the IPv6 implementation (CVE-2021-45485) * Information leak in the IPv4 implementation (CVE-2021-45486) * Incomplete cleanup of multi-core shared buffers (aka SBDR) (CVE-2022-21123) * Incomplete cleanup of microarchitectural fill buffers (aka SBDS) (CVE-2022-21125) * Incomplete cleanup in specific special register write operations (aka DRPW) (CVE-2022-21166) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * DR, Ignore modify TTL if ConnectX-5 doesn't support it (BZ#2075549) * execve exit tracepoint not called (BZ#2106663) * Unable to boot RHEL-8.6 on Brazos max. config (Install is success) (BZ#2107475) * "vmcore failed, _exitcode:139" error observed while capturing vmcore during fadump after memory remove. incomplete vmcore is captured. (BZ#2107490) * soft lockups under heavy I/O load to ahci connected SSDs (BZ#2110773) * Allow substituting custom vmlinux.h for the build (BZ#2116407) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 2039911 - CVE-2021-45485 kernel: information leak in the IPv6 implementation 2039914 - CVE-2021-45486 kernel: information leak in the IPv4 implementation 2090237 - CVE-2022-21123 hw: cpu: Incomplete cleanup of multi-core shared buffers (aka SBDR) 2090240 - CVE-2022-21125 hw: cpu: Incomplete cleanup of microarchitectural fill buffers (aka SBDS) 2090241 - CVE-2022-21166 hw: cpu: Incomplete cleanup in specific special register write operations (aka DRPW) 2114849 - CVE-2022-2588 kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation 6. Package List: Red Hat Enterprise Linux BaseOS EUS (v.8.4): Source: kernel-4.18.0-305.65.1.el8_4.src.rpm aarch64: bpftool-4.18.0-305.65.1.el8_4.aarch64.rpm bpftool-debuginfo-4.18.0-305.65.1.el8_4.aarch64.rpm kernel-4.18.0-305.65.1.el8_4.aarch64.rpm kernel-core-4.18.0-305.65.1.el8_4.aarch64.rpm kernel-cross-headers-4.18.0-305.65.1.el8_4.aarch64.rpm kernel-debug-4.18.0-305.65.1.el8_4.aarch64.rpm kernel-debug-core-4.18.0-305.65.1.el8_4.aarch64.rpm kernel-debug-debuginfo-4.18.0-305.65.1.el8_4.aarch64.rpm kernel-debug-devel-4.18.0-305.65.1.el8_4.aarch64.rpm kernel-debug-modules-4.18.0-305.65.1.el8_4.aarch64.rpm kernel-debug-modules-extra-4.18.0-305.65.1.el8_4.aarch64.rpm kernel-debuginfo-4.18.0-305.65.1.el8_4.aarch64.rpm kernel-debuginfo-common-aarch64-4.18.0-305.65.1.el8_4.aarch64.rpm kernel-devel-4.18.0-305.65.1.el8_4.aarch64.rpm kernel-headers-4.18.0-305.65.1.el8_4.aarch64.rpm kernel-modules-4.18.0-305.65.1.el8_4.aarch64.rpm kernel-modules-extra-4.18.0-305.65.1.el8_4.aarch64.rpm kernel-tools-4.18.0-305.65.1.el8_4.aarch64.rpm kernel-tools-debuginfo-4.18.0-305.65.1.el8_4.aarch64.rpm kernel-tools-libs-4.18.0-305.65.1.el8_4.aarch64.rpm perf-4.18.0-305.65.1.el8_4.aarch64.rpm perf-debuginfo-4.18.0-305.65.1.el8_4.aarch64.rpm python3-perf-4.18.0-305.65.1.el8_4.aarch64.rpm python3-perf-debuginfo-4.18.0-305.65.1.el8_4.aarch64.rpm noarch: kernel-abi-stablelists-4.18.0-305.65.1.el8_4.noarch.rpm kernel-doc-4.18.0-305.65.1.el8_4.noarch.rpm ppc64le: bpftool-4.18.0-305.65.1.el8_4.ppc64le.rpm bpftool-debuginfo-4.18.0-305.65.1.el8_4.ppc64le.rpm kernel-4.18.0-305.65.1.el8_4.ppc64le.rpm kernel-core-4.18.0-305.65.1.el8_4.ppc64le.rpm kernel-cross-headers-4.18.0-305.65.1.el8_4.ppc64le.rpm kernel-debug-4.18.0-305.65.1.el8_4.ppc64le.rpm kernel-debug-core-4.18.0-305.65.1.el8_4.ppc64le.rpm kernel-debug-debuginfo-4.18.0-305.65.1.el8_4.ppc64le.rpm kernel-debug-devel-4.18.0-305.65.1.el8_4.ppc64le.rpm kernel-debug-modules-4.18.0-305.65.1.el8_4.ppc64le.rpm kernel-debug-modules-extra-4.18.0-305.65.1.el8_4.ppc64le.rpm kernel-debuginfo-4.18.0-305.65.1.el8_4.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.18.0-305.65.1.el8_4.ppc64le.rpm kernel-devel-4.18.0-305.65.1.el8_4.ppc64le.rpm kernel-headers-4.18.0-305.65.1.el8_4.ppc64le.rpm kernel-modules-4.18.0-305.65.1.el8_4.ppc64le.rpm kernel-modules-extra-4.18.0-305.65.1.el8_4.ppc64le.rpm kernel-tools-4.18.0-305.65.1.el8_4.ppc64le.rpm kernel-tools-debuginfo-4.18.0-305.65.1.el8_4.ppc64le.rpm kernel-tools-libs-4.18.0-305.65.1.el8_4.ppc64le.rpm perf-4.18.0-305.65.1.el8_4.ppc64le.rpm perf-debuginfo-4.18.0-305.65.1.el8_4.ppc64le.rpm python3-perf-4.18.0-305.65.1.el8_4.ppc64le.rpm python3-perf-debuginfo-4.18.0-305.65.1.el8_4.ppc64le.rpm s390x: bpftool-4.18.0-305.65.1.el8_4.s390x.rpm bpftool-debuginfo-4.18.0-305.65.1.el8_4.s390x.rpm kernel-4.18.0-305.65.1.el8_4.s390x.rpm kernel-core-4.18.0-305.65.1.el8_4.s390x.rpm kernel-cross-headers-4.18.0-305.65.1.el8_4.s390x.rpm kernel-debug-4.18.0-305.65.1.el8_4.s390x.rpm kernel-debug-core-4.18.0-305.65.1.el8_4.s390x.rpm kernel-debug-debuginfo-4.18.0-305.65.1.el8_4.s390x.rpm kernel-debug-devel-4.18.0-305.65.1.el8_4.s390x.rpm kernel-debug-modules-4.18.0-305.65.1.el8_4.s390x.rpm kernel-debug-modules-extra-4.18.0-305.65.1.el8_4.s390x.rpm kernel-debuginfo-4.18.0-305.65.1.el8_4.s390x.rpm kernel-debuginfo-common-s390x-4.18.0-305.65.1.el8_4.s390x.rpm kernel-devel-4.18.0-305.65.1.el8_4.s390x.rpm kernel-headers-4.18.0-305.65.1.el8_4.s390x.rpm kernel-modules-4.18.0-305.65.1.el8_4.s390x.rpm kernel-modules-extra-4.18.0-305.65.1.el8_4.s390x.rpm kernel-tools-4.18.0-305.65.1.el8_4.s390x.rpm kernel-tools-debuginfo-4.18.0-305.65.1.el8_4.s390x.rpm kernel-zfcpdump-4.18.0-305.65.1.el8_4.s390x.rpm kernel-zfcpdump-core-4.18.0-305.65.1.el8_4.s390x.rpm kernel-zfcpdump-debuginfo-4.18.0-305.65.1.el8_4.s390x.rpm kernel-zfcpdump-devel-4.18.0-305.65.1.el8_4.s390x.rpm kernel-zfcpdump-modules-4.18.0-305.65.1.el8_4.s390x.rpm kernel-zfcpdump-modules-extra-4.18.0-305.65.1.el8_4.s390x.rpm perf-4.18.0-305.65.1.el8_4.s390x.rpm perf-debuginfo-4.18.0-305.65.1.el8_4.s390x.rpm python3-perf-4.18.0-305.65.1.el8_4.s390x.rpm python3-perf-debuginfo-4.18.0-305.65.1.el8_4.s390x.rpm x86_64: bpftool-4.18.0-305.65.1.el8_4.x86_64.rpm bpftool-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm kernel-4.18.0-305.65.1.el8_4.x86_64.rpm kernel-core-4.18.0-305.65.1.el8_4.x86_64.rpm kernel-cross-headers-4.18.0-305.65.1.el8_4.x86_64.rpm kernel-debug-4.18.0-305.65.1.el8_4.x86_64.rpm kernel-debug-core-4.18.0-305.65.1.el8_4.x86_64.rpm kernel-debug-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm kernel-debug-devel-4.18.0-305.65.1.el8_4.x86_64.rpm kernel-debug-modules-4.18.0-305.65.1.el8_4.x86_64.rpm kernel-debug-modules-extra-4.18.0-305.65.1.el8_4.x86_64.rpm kernel-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm kernel-debuginfo-common-x86_64-4.18.0-305.65.1.el8_4.x86_64.rpm kernel-devel-4.18.0-305.65.1.el8_4.x86_64.rpm kernel-headers-4.18.0-305.65.1.el8_4.x86_64.rpm kernel-modules-4.18.0-305.65.1.el8_4.x86_64.rpm kernel-modules-extra-4.18.0-305.65.1.el8_4.x86_64.rpm kernel-tools-4.18.0-305.65.1.el8_4.x86_64.rpm kernel-tools-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm kernel-tools-libs-4.18.0-305.65.1.el8_4.x86_64.rpm perf-4.18.0-305.65.1.el8_4.x86_64.rpm perf-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm python3-perf-4.18.0-305.65.1.el8_4.x86_64.rpm python3-perf-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm Red Hat CodeReady Linux Builder EUS (v. 8.4): aarch64: bpftool-debuginfo-4.18.0-305.65.1.el8_4.aarch64.rpm kernel-debug-debuginfo-4.18.0-305.65.1.el8_4.aarch64.rpm kernel-debuginfo-4.18.0-305.65.1.el8_4.aarch64.rpm kernel-debuginfo-common-aarch64-4.18.0-305.65.1.el8_4.aarch64.rpm kernel-tools-debuginfo-4.18.0-305.65.1.el8_4.aarch64.rpm kernel-tools-libs-devel-4.18.0-305.65.1.el8_4.aarch64.rpm perf-debuginfo-4.18.0-305.65.1.el8_4.aarch64.rpm python3-perf-debuginfo-4.18.0-305.65.1.el8_4.aarch64.rpm ppc64le: bpftool-debuginfo-4.18.0-305.65.1.el8_4.ppc64le.rpm kernel-debug-debuginfo-4.18.0-305.65.1.el8_4.ppc64le.rpm kernel-debuginfo-4.18.0-305.65.1.el8_4.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.18.0-305.65.1.el8_4.ppc64le.rpm kernel-tools-debuginfo-4.18.0-305.65.1.el8_4.ppc64le.rpm kernel-tools-libs-devel-4.18.0-305.65.1.el8_4.ppc64le.rpm perf-debuginfo-4.18.0-305.65.1.el8_4.ppc64le.rpm python3-perf-debuginfo-4.18.0-305.65.1.el8_4.ppc64le.rpm x86_64: bpftool-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm kernel-debug-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm kernel-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm kernel-debuginfo-common-x86_64-4.18.0-305.65.1.el8_4.x86_64.rpm kernel-tools-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm kernel-tools-libs-devel-4.18.0-305.65.1.el8_4.x86_64.rpm perf-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm python3-perf-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBY06+8tzjgjWX9erEAQgCtA//f0ySJLrYcFKpxldWHCr7HnGpfBaXh4g/ XLr++MsSvHZX02L5L5+lx2o3K0ZlnBdb9J3K3JykN6cApvHJw3lwy3fyBU3gWFz/ exkwTvF6CdPs9CpsXGdpmdVd9jKDNub08KGemS4LL7VSI75Enleoe2vGNOOhlbIA O8taEzIfq4m4BX8VZwuflAYjsOFkV1ax0iiL2vcmF7deXZDrGk0axHEaXJLmP9w/ tD+VnoKSV2eQnirVCblG94WqOce20EUF4+o3WAYjkcueWdY4gLRjTOKdLrzUF7EI aDvZyvcxtvIWq+0CgC0NBb9mbvQjsr7jdDT4MnERyePFlQNInKR5YKKbnS9Blw5p OM6o8/nxjKAOxDNe1ob9AaPOhu/nxKVVgEiq0pn603ZMZPGGtkP2QclCvPZ7NOyH J1G/89l2sbSK5d+d+Z7v2/CXimogCqaW9F2ysrkxYVIE8LDSCeqZttyHtOFI0yrm 3OJfJfLJFcz/8beY7hXWWGQ697IJNl8uymY7SdPk47ulec7FTSrax8F9DcI+bn1q qG4ekwG6BOycTH7epRRVCKwiRglhJwoO4zDZsEsjyTsAg0HUdo7MYsU3l4IGJeLO 26YmdgdRAagVGiEBdlH9dNwI5GjtOP3JhCy4qUErGNrRRV/otEbdQvLBSbQOUBLY n4FMroQf7Lo=5/cJ -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . Description: Red Hat Advanced Cluster Management for Kubernetes 2.5.3 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release: https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html/release_notes/ Security fix: * search-api-container: search-api: SQL injection leads to remote denial of service (CVE-2022-2238) Bug fixes: * search-aggregator pod is continuously getting OOMkilled on the hub (BZ# 2092863) * ACM 2.5 cannot create known_hosts file when pulling from ssh git repo (BZ# 2105885) * Production RHACM upgrade from v2.4.2 to 2.5.1 (BZ# 2121063) * No errors shown for failed helm deployments (BZ# 2124636) * In topology, cluster deploy status is shown as not deployed however new project is created on the cluster (BZ# 2125441) 3. Bugs fixed (https://bugzilla.redhat.com/): 2092863 - search-aggregator pod is continuously getting OOMkilled on the hub 2101669 - CVE-2022-2238 search-api: SQL injection leads to remote denial of service 2105885 - ACM 2.5 cannot create known_hosts file when pulling from ssh git repo 2121063 - Production RHACM upgrade from v2.4.2 to 2.5.1 2124636 - no errors shown for failed helm deployments 2125441 - In topology, cluster deploy status is shown as not deployed however new project is created on the cluster 5. 8.1) - aarch64, noarch, ppc64le, s390x, x86_64 3. ========================================================================== Ubuntu Security Notice USN-5505-1 July 07, 2022 linux-lts-xenial, linux-kvm vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 ESM - Ubuntu 14.04 ESM Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-kvm: Linux kernel for cloud environments - linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty Details: Norbert Slusarek discovered a race condition in the CAN BCM networking protocol of the Linux kernel leading to multiple use-after-free vulnerabilities. A local attacker could use this issue to execute arbitrary code. (CVE-2021-3609) Likang Luo discovered that a race condition existed in the Bluetooth subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-3752) It was discovered that the NFC subsystem in the Linux kernel contained a use-after-free vulnerability in its NFC Controller Interface (NCI) implementation. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2021-3760) Szymon Heidrich discovered that the USB Gadget subsystem in the Linux kernel did not properly restrict the size of control requests for certain gadget types, leading to possible out of bounds reads or writes. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-39685) It was discovered that the Ion Memory Manager subsystem in the Linux kernel contained a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2021-39714) Eric Biederman discovered that the cgroup process migration implementation in the Linux kernel did not perform permission checks correctly in some situations. A local attacker could possibly use this to gain administrative privileges. (CVE-2021-4197) Lin Ma discovered that the NFC Controller Interface (NCI) implementation in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-4202) Sushma Venkatesh Reddy discovered that the Intel i915 graphics driver in the Linux kernel did not perform a GPU TLB flush in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2022-0330) It was discovered that the PF_KEYv2 implementation in the Linux kernel did not properly initialize kernel memory in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2022-1353) It was discovered that the virtual graphics memory manager implementation in the Linux kernel was subject to a race condition, potentially leading to an information leak. (CVE-2022-1419) Minh Yuan discovered that the floppy disk driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-1652) It was discovered that the Atheros ath9k wireless device driver in the Linux kernel did not properly handle some error conditions, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1679) It was discovered that the Marvell NFC device driver implementation in the Linux kernel did not properly perform memory cleanup operations in some situations, leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system) or execute arbitrary code. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21123) It was discovered that some Intel processors did not completely perform cleanup actions on microarchitectural fill buffers. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21125) It was discovered that some Intel processors did not properly perform cleanup during specific special register write operations. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21166) It was discovered that the USB Gadget file system interface in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-24958) 赵子轩 discovered that the 802.2 LLC type 2 driver in the Linux kernel did not properly perform reference counting in some error conditions. A local attacker could use this to cause a denial of service. (CVE-2022-28356) It was discovered that the 8 Devices USB2CAN interface implementation in the Linux kernel did not properly handle certain error conditions, leading to a double-free. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-28388) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 ESM: linux-image-4.4.0-1110-kvm 4.4.0-1110.120 linux-image-kvm 4.4.0.1110.107 Ubuntu 14.04 ESM: linux-image-4.4.0-229-generic 4.4.0-229.263~14.04.1 linux-image-4.4.0-229-lowlatency 4.4.0-229.263~14.04.1 linux-image-generic-lts-xenial 4.4.0.229.199 linux-image-lowlatency-lts-xenial 4.4.0.229.199 linux-image-virtual-lts-xenial 4.4.0.229.199 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5505-1 CVE-2021-3609, CVE-2021-3752, CVE-2021-3760, CVE-2021-39685, CVE-2021-39714, CVE-2021-4197, CVE-2021-4202, CVE-2022-0330, CVE-2022-1353, CVE-2022-1419, CVE-2022-1652, CVE-2022-1679, CVE-2022-1734, CVE-2022-21123, CVE-2022-21125, CVE-2022-21166, CVE-2022-24958, CVE-2022-28356, CVE-2022-28388 . 8.2) - x86_64 3. Description: The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Bug Fix(es): * Update RT source tree to the latest RHEL-8.2.z21 Batch (BZ#2100575) 4

Trust: 1.8

sources: NVD: CVE-2022-21123 // VULHUB: VHN-406835 // PACKETSTORM: 168426 // PACKETSTORM: 169409 // PACKETSTORM: 168724 // PACKETSTORM: 168694 // PACKETSTORM: 167714 // PACKETSTORM: 167746 // PACKETSTORM: 167549 // PACKETSTORM: 170222 // PACKETSTORM: 169690

AFFECTED PRODUCTS

vendor:debianmodel:linuxscope:eqversion:11.0

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:35

Trust: 1.0

vendor:intelmodel:sgx sdkscope:ltversion:2.16.100.3

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:36

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:intelmodel:sgx pswscope:ltversion:2.16.100.3

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:xenmodel:xenscope:eqversion:*

Trust: 1.0

vendor:intelmodel:sgx sdkscope:ltversion:2.17.100.3

Trust: 1.0

vendor:intelmodel:sgx pswscope:ltversion:2.17.100.3

Trust: 1.0

vendor:vmwaremodel:esxiscope:eqversion:7.0

Trust: 1.0

vendor:intelmodel:sgx dcapscope:ltversion:1.14.100.3

Trust: 1.0

sources: NVD: CVE-2022-21123

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-21123
value: MEDIUM

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2022-21123
value: MEDIUM

Trust: 1.0

VULHUB: VHN-406835
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2022-21123
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-406835
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2022-21123
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.1

Trust: 2.0

sources: VULHUB: VHN-406835 // NVD: CVE-2022-21123 // NVD: CVE-2022-21123

PROBLEMTYPE DATA

problemtype:CWE-459

Trust: 1.1

sources: VULHUB: VHN-406835 // NVD: CVE-2022-21123

THREAT TYPE

local

Trust: 0.3

sources: PACKETSTORM: 167714 // PACKETSTORM: 167746 // PACKETSTORM: 167549

TYPE

arbitrary

Trust: 0.2

sources: PACKETSTORM: 167714 // PACKETSTORM: 167746

EXTERNAL IDS

db:NVDid:CVE-2022-21123

Trust: 2.0

db:OPENWALLid:OSS-SECURITY/2022/06/16/1

Trust: 1.1

db:PACKETSTORMid:169690

Trust: 0.2

db:PACKETSTORMid:167714

Trust: 0.2

db:PACKETSTORMid:168694

Trust: 0.2

db:PACKETSTORMid:167549

Trust: 0.2

db:PACKETSTORMid:167746

Trust: 0.2

db:PACKETSTORMid:167785

Trust: 0.1

db:PACKETSTORMid:169719

Trust: 0.1

db:PACKETSTORMid:169688

Trust: 0.1

db:PACKETSTORMid:168294

Trust: 0.1

db:PACKETSTORMid:168021

Trust: 0.1

db:PACKETSTORMid:168018

Trust: 0.1

db:PACKETSTORMid:168503

Trust: 0.1

db:PACKETSTORMid:168538

Trust: 0.1

db:PACKETSTORMid:169695

Trust: 0.1

db:PACKETSTORMid:168076

Trust: 0.1

db:PACKETSTORMid:169941

Trust: 0.1

db:PACKETSTORMid:169997

Trust: 0.1

db:PACKETSTORMid:168461

Trust: 0.1

db:PACKETSTORMid:167862

Trust: 0.1

db:PACKETSTORMid:168364

Trust: 0.1

db:PACKETSTORMid:167692

Trust: 0.1

db:PACKETSTORMid:167545

Trust: 0.1

db:PACKETSTORMid:170226

Trust: 0.1

db:PACKETSTORMid:168355

Trust: 0.1

db:VULHUBid:VHN-406835

Trust: 0.1

db:PACKETSTORMid:168426

Trust: 0.1

db:PACKETSTORMid:169409

Trust: 0.1

db:PACKETSTORMid:168724

Trust: 0.1

db:PACKETSTORMid:170222

Trust: 0.1

sources: VULHUB: VHN-406835 // PACKETSTORM: 168426 // PACKETSTORM: 169409 // PACKETSTORM: 168724 // PACKETSTORM: 168694 // PACKETSTORM: 167714 // PACKETSTORM: 167746 // PACKETSTORM: 167549 // PACKETSTORM: 170222 // PACKETSTORM: 169690 // NVD: CVE-2022-21123

REFERENCES

url:https://security.netapp.com/advisory/ntap-20220624-0008/

Trust: 1.1

url:https://www.debian.org/security/2022/dsa-5173

Trust: 1.1

url:https://www.debian.org/security/2022/dsa-5178

Trust: 1.1

url:https://www.debian.org/security/2022/dsa-5184

Trust: 1.1

url:https://security.gentoo.org/glsa/202208-23

Trust: 1.1

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html

Trust: 1.1

url:https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2022/06/16/1

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/t4p2kjyl74kglhe4jzetvw7pzh6ziaba/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/fhtew3rxu2gw6s3rcpqg4vnczgi3tosv/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/rkrxz4lhgcgmog24zcejny6r2bts4s2q/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/mcvomhbqrh4kp7in6u24cw7f2d2l5kbs/

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2022-21123

Trust: 0.9

url:https://nvd.nist.gov/vuln/detail/cve-2022-21166

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2022-21125

Trust: 0.7

url:https://access.redhat.com/security/cve/cve-2022-21123

Trust: 0.6

url:https://access.redhat.com/security/team/contact/

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2022-21166

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2022-21125

Trust: 0.6

url:https://bugzilla.redhat.com/):

Trust: 0.6

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.6

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.4

url:https://access.redhat.com/security/team/key/

Trust: 0.4

url:https://access.redhat.com/articles/11258

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2022-2588

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-2588

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-0391

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-20107

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-34903

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2015-20107

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-0391

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-34903

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-3752

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-3760

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1679

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-39714

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1419

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-0330

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-39685

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-3609

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1652

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1734

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-4202

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-4197

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1353

Trust: 0.2

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/t4p2kjyl74kglhe4jzetvw7pzh6ziaba/

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/rkrxz4lhgcgmog24zcejny6r2bts4s2q/

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/fhtew3rxu2gw6s3rcpqg4vnczgi3tosv/

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/mcvomhbqrh4kp7in6u24cw7f2d2l5kbs/

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:6536

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-38561

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-21698

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:6537

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-21698

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-38561

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-45486

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-45486

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-45485

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-45485

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:6983

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2238

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-2238

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:6954

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html/release_notes/

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html-single/install/index#installing

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:6872

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5505-1

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5513-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws-5.4/5.4.0-1080.87~18.04.1

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5485-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/5.13.0-1031.37

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-ibm-5.4/5.4.0-1028.32~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/5.13.0-1030.33

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gke/5.15.0-1010.13

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-ibm/5.4.0-1028.32

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/5.4.0-1085.90

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1101.112

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/5.15.0-1011.15

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe-5.13/5.13.0-51.58~20.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gkeop-5.4/5.4.0-1048.51~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure-5.13/5.13.0-1031.37~20.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/5.4.0-1070.75

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp-5.4/5.4.0-1080.87~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1136.147

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1122.127

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gkeop/5.4.0-1048.51

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-ibm/5.15.0-1009.11

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/5.13.0-1033.40

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/5.13.0-1036.43

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/5.15.0-1012.14

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure-4.15/4.15.0-1145.160

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure-fde/5.4.0-1085.90+cvm1.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.15.0-187.198

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/5.13.0-51.58

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/5.15.0-39.42

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-dell300x/4.15.0-1048.53

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp-4.15/4.15.0-1130.146

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle-5.4/5.4.0-1078.86~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure-5.4/5.4.0-1085.90~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/5.15.0-1010.15

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/5.4.0-1080.87

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gke/5.4.0-1076.82

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle-5.13/5.13.0-1036.43~20.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/5.4.0-1078.86

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/5.4.0-120.136

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws-5.13/5.13.0-1031.35~20.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/5.15.0-1012.15

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp-5.13/5.13.0-1033.40~20.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gke-5.4/5.4.0-1076.82~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-intel-5.13/5.13.0-1017.19

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/5.4.0-1080.87

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe-5.4/5.4.0-120.136~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/5.13.0-1031.35

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-intel-iotg/5.15.0-1010.14

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/5.15.0-1013.17

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-lowlatency/5.15.0-39.42

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1158

Trust: 0.1

url:https://access.redhat.com/solutions/6971358

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-43945

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-29900

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-23825

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1158

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-23825

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-26373

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-29900

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-29901

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-2639

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-29901

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2639

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-43945

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-23816

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-26373

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2959

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-2959

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-23816

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:8974

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:7280

Trust: 0.1

sources: VULHUB: VHN-406835 // PACKETSTORM: 168426 // PACKETSTORM: 169409 // PACKETSTORM: 168724 // PACKETSTORM: 168694 // PACKETSTORM: 167714 // PACKETSTORM: 167746 // PACKETSTORM: 167549 // PACKETSTORM: 170222 // PACKETSTORM: 169690 // NVD: CVE-2022-21123

CREDITS

Red Hat

Trust: 0.6

sources: PACKETSTORM: 168426 // PACKETSTORM: 169409 // PACKETSTORM: 168724 // PACKETSTORM: 168694 // PACKETSTORM: 170222 // PACKETSTORM: 169690

SOURCES

db:VULHUBid:VHN-406835
db:PACKETSTORMid:168426
db:PACKETSTORMid:169409
db:PACKETSTORMid:168724
db:PACKETSTORMid:168694
db:PACKETSTORMid:167714
db:PACKETSTORMid:167746
db:PACKETSTORMid:167549
db:PACKETSTORMid:170222
db:PACKETSTORMid:169690
db:NVDid:CVE-2022-21123

LAST UPDATE DATE

2026-03-25T22:10:42.470000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-406835date:2022-08-19T00:00:00
db:NVDid:CVE-2022-21123date:2025-05-05T17:17:37.153

SOURCES RELEASE DATE

db:VULHUBid:VHN-406835date:2022-06-15T00:00:00
db:PACKETSTORMid:168426date:2022-09-20T13:59:11
db:PACKETSTORMid:169409date:2022-10-18T22:30:43
db:PACKETSTORMid:168724date:2022-10-17T14:00:16
db:PACKETSTORMid:168694date:2022-10-11T16:07:13
db:PACKETSTORMid:167714date:2022-07-07T13:08:49
db:PACKETSTORMid:167746date:2022-07-14T14:32:14
db:PACKETSTORMid:167549date:2022-06-20T16:17:04
db:PACKETSTORMid:170222date:2022-12-14T15:46:04
db:PACKETSTORMid:169690date:2022-11-02T15:00:04
db:NVDid:CVE-2022-21123date:2022-06-15T20:15:17.503