ID

VAR-202206-1186


CVE

CVE-2022-21125


TITLE

plural  Intel(R) Processor  Incomplete Cleanup Vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-011636

DESCRIPTION

Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. plural Intel(R) Processor contains an incomplete cleanup vulnerability.Information may be obtained. Description: The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Bug Fix(es): * update RT source tree to the RHEL-8.4.z12 source tree (BZ#2119160) * using __this_cpu_add() in preemptible [00000000] - caller is __mod_memcg_lruvec_state+0x69/0x1c0 [None8.4.0.z] (BZ#2124454) 4. ========================================================================== Ubuntu Security Notice USN-5485-1 June 17, 2022 linux, linux-aws, linux-aws-hwe, linux-aws-5.13, linux-aws-5.4, linux-azure, linux-azure-4.15, linux-azure-5.13, linux-azure-5.4, linux-azure-fde, linux-dell300x, linux-gcp, linux-gcp-4.15, linux-gcp-5.13, linux-gcp-5.4, linux-gke, linux-gke-5.4, linux-gkeop, linux-gkeop-5.4, linux-hwe, linux-hwe-5.13, linux-hwe-5.4, linux-ibm, linux-ibm-5.4, linux-intel-5.13, linux-intel-iotg, linux-kvm, linux-lowlatency, linux-oracle, linux-oracle-5.13, linux-oracle-5.4 vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.04 LTS - Ubuntu 21.10 - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 ESM - Ubuntu 14.04 ESM Summary: Several security issues were addressed in the Linux kernel. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21123) It was discovered that some Intel processors did not completely perform cleanup actions on microarchitectural fill buffers. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21125) It was discovered that some Intel processors did not properly perform cleanup during specific special register write operations. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21166) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 LTS: linux-image-5.15.0-1009-ibm 5.15.0-1009.11 linux-image-5.15.0-1010-gcp 5.15.0-1010.15 linux-image-5.15.0-1010-gke 5.15.0-1010.13 linux-image-5.15.0-1010-intel-iotg 5.15.0-1010.14 linux-image-5.15.0-1011-oracle 5.15.0-1011.15 linux-image-5.15.0-1012-azure 5.15.0-1012.15 linux-image-5.15.0-1012-kvm 5.15.0-1012.14 linux-image-5.15.0-1013-aws 5.15.0-1013.17 linux-image-5.15.0-39-generic 5.15.0-39.42 linux-image-5.15.0-39-generic-64k 5.15.0-39.42 linux-image-5.15.0-39-generic-lpae 5.15.0-39.42 linux-image-5.15.0-39-lowlatency 5.15.0-39.42 linux-image-5.15.0-39-lowlatency-64k 5.15.0-39.42 linux-image-aws 5.15.0.1013.13 linux-image-azure 5.15.0.1012.11 linux-image-gcp 5.15.0.1010.9 linux-image-generic 5.15.0.39.40 linux-image-generic-hwe-22.04 5.15.0.39.40 linux-image-generic-lpae 5.15.0.39.40 linux-image-generic-lpae-hwe-22.04 5.15.0.39.40 linux-image-gke 5.15.0.1010.13 linux-image-gke-5.15 5.15.0.1010.13 linux-image-ibm 5.15.0.1009.8 linux-image-intel-iotg 5.15.0.1010.10 linux-image-kvm 5.15.0.1012.10 linux-image-lowlatency 5.15.0.39.38 linux-image-lowlatency-hwe-22.04 5.15.0.39.38 linux-image-oem-20.04 5.15.0.39.40 linux-image-oracle 5.15.0.1011.9 linux-image-virtual 5.15.0.39.40 linux-image-virtual-hwe-22.04 5.15.0.39.40 Ubuntu 21.10: linux-image-5.13.0-1030-kvm 5.13.0-1030.33 linux-image-5.13.0-1031-aws 5.13.0-1031.35 linux-image-5.13.0-1031-azure 5.13.0-1031.37 linux-image-5.13.0-1033-gcp 5.13.0-1033.40 linux-image-5.13.0-1036-oracle 5.13.0-1036.43 linux-image-5.13.0-51-generic 5.13.0-51.58 linux-image-5.13.0-51-generic-lpae 5.13.0-51.58 linux-image-5.13.0-51-lowlatency 5.13.0-51.58 linux-image-aws 5.13.0.1031.29 linux-image-azure 5.13.0.1031.28 linux-image-gcp 5.13.0.1033.28 linux-image-generic 5.13.0.51.57 linux-image-generic-lpae 5.13.0.51.57 linux-image-gke 5.13.0.1033.28 linux-image-kvm 5.13.0.1030.27 linux-image-lowlatency 5.13.0.51.57 linux-image-oem-20.04 5.13.0.51.57 linux-image-oracle 5.13.0.1036.33 linux-image-virtual 5.13.0.51.57 Ubuntu 20.04 LTS: linux-image-5.13.0-1017-intel 5.13.0-1017.19 linux-image-5.13.0-1031-aws 5.13.0-1031.35~20.04.1 linux-image-5.13.0-1031-azure 5.13.0-1031.37~20.04.1 linux-image-5.13.0-1033-gcp 5.13.0-1033.40~20.04.1 linux-image-5.13.0-1036-oracle 5.13.0-1036.43~20.04.1 linux-image-5.13.0-51-generic 5.13.0-51.58~20.04.1 linux-image-5.13.0-51-generic-64k 5.13.0-51.58~20.04.1 linux-image-5.13.0-51-generic-lpae 5.13.0-51.58~20.04.1 linux-image-5.13.0-51-lowlatency 5.13.0-51.58~20.04.1 linux-image-5.4.0-1028-ibm 5.4.0-1028.32 linux-image-5.4.0-1048-gkeop 5.4.0-1048.51 linux-image-5.4.0-1070-kvm 5.4.0-1070.75 linux-image-5.4.0-1076-gke 5.4.0-1076.82 linux-image-5.4.0-1078-oracle 5.4.0-1078.86 linux-image-5.4.0-1080-aws 5.4.0-1080.87 linux-image-5.4.0-1080-gcp 5.4.0-1080.87 linux-image-5.4.0-1085-azure 5.4.0-1085.90 linux-image-5.4.0-1085-azure-fde 5.4.0-1085.90+cvm1.1 linux-image-5.4.0-120-generic 5.4.0-120.136 linux-image-5.4.0-120-generic-lpae 5.4.0-120.136 linux-image-5.4.0-120-lowlatency 5.4.0-120.136 linux-image-aws 5.13.0.1031.35~20.04.25 linux-image-aws-lts-20.04 5.4.0.1080.80 linux-image-azure 5.13.0.1031.37~20.04.20 linux-image-azure-fde 5.4.0.1085.90+cvm1.25 linux-image-azure-lts-20.04 5.4.0.1085.82 linux-image-gcp 5.13.0.1033.40~20.04.1 linux-image-gcp-lts-20.04 5.4.0.1080.86 linux-image-generic 5.4.0.120.121 linux-image-generic-hwe-20.04 5.13.0.51.58~20.04.31 linux-image-generic-lpae 5.4.0.120.121 linux-image-generic-lpae-hwe-20.04 5.13.0.51.58~20.04.31 linux-image-gke 5.4.0.1076.84 linux-image-gke-5.4 5.4.0.1076.84 linux-image-gkeop 5.4.0.1048.49 linux-image-gkeop-5.4 5.4.0.1048.49 linux-image-ibm 5.4.0.1028.25 linux-image-ibm-lts-20.04 5.4.0.1028.25 linux-image-intel 5.13.0.1017.15 linux-image-kvm 5.4.0.1070.67 linux-image-lowlatency 5.4.0.120.121 linux-image-lowlatency-hwe-20.04 5.13.0.51.58~20.04.31 linux-image-oem 5.4.0.120.121 linux-image-oem-osp1 5.4.0.120.121 linux-image-oracle 5.13.0.1036.43~20.04.1 linux-image-oracle-lts-20.04 5.4.0.1078.76 linux-image-virtual 5.4.0.120.121 linux-image-virtual-hwe-20.04 5.13.0.51.58~20.04.31 Ubuntu 18.04 LTS: linux-image-4.15.0-1048-dell300x 4.15.0-1048.53 linux-image-4.15.0-1101-oracle 4.15.0-1101.112 linux-image-4.15.0-1122-kvm 4.15.0-1122.127 linux-image-4.15.0-1130-gcp 4.15.0-1130.146 linux-image-4.15.0-1136-aws 4.15.0-1136.147 linux-image-4.15.0-1145-azure 4.15.0-1145.160 linux-image-4.15.0-187-generic 4.15.0-187.198 linux-image-4.15.0-187-generic-lpae 4.15.0-187.198 linux-image-4.15.0-187-lowlatency 4.15.0-187.198 linux-image-5.4.0-1028-ibm 5.4.0-1028.32~18.04.1 linux-image-5.4.0-1048-gkeop 5.4.0-1048.51~18.04.1 linux-image-5.4.0-1076-gke 5.4.0-1076.82~18.04.1 linux-image-5.4.0-1078-oracle 5.4.0-1078.86~18.04.1 linux-image-5.4.0-1080-aws 5.4.0-1080.87~18.04.1 linux-image-5.4.0-1080-gcp 5.4.0-1080.87~18.04.1 linux-image-5.4.0-1085-azure 5.4.0-1085.90~18.04.1 linux-image-5.4.0-120-generic 5.4.0-120.136~18.04.1 linux-image-5.4.0-120-generic-lpae 5.4.0-120.136~18.04.1 linux-image-5.4.0-120-lowlatency 5.4.0-120.136~18.04.1 linux-image-aws 5.4.0.1080.60 linux-image-aws-lts-18.04 4.15.0.1136.136 linux-image-azure 5.4.0.1085.62 linux-image-azure-lts-18.04 4.15.0.1145.115 linux-image-dell300x 4.15.0.1048.48 linux-image-gcp 5.4.0.1080.61 linux-image-gcp-lts-18.04 4.15.0.1130.146 linux-image-generic 4.15.0.187.173 linux-image-generic-hwe-18.04 5.4.0.120.136~18.04.100 linux-image-generic-lpae 4.15.0.187.173 linux-image-generic-lpae-hwe-18.04 5.4.0.120.136~18.04.100 linux-image-gke-5.4 5.4.0.1076.82~18.04.38 linux-image-gkeop-5.4 5.4.0.1048.51~18.04.45 linux-image-ibm 5.4.0.1028.42 linux-image-kvm 4.15.0.1122.115 linux-image-lowlatency 4.15.0.187.173 linux-image-lowlatency-hwe-18.04 5.4.0.120.136~18.04.100 linux-image-oem 5.4.0.120.136~18.04.100 linux-image-oem-osp1 5.4.0.120.136~18.04.100 linux-image-oracle 5.4.0.1078.86~18.04.55 linux-image-oracle-lts-18.04 4.15.0.1101.108 linux-image-snapdragon-hwe-18.04 5.4.0.120.136~18.04.100 linux-image-virtual 4.15.0.187.173 linux-image-virtual-hwe-18.04 5.4.0.120.136~18.04.100 Ubuntu 16.04 ESM: linux-image-4.15.0-1101-oracle 4.15.0-1101.112~16.04.1 linux-image-4.15.0-1130-gcp 4.15.0-1130.146~16.04.1 linux-image-4.15.0-1136-aws-hwe 4.15.0-1136.147~16.04.1 linux-image-4.15.0-1145-azure 4.15.0-1145.160~16.04.1 linux-image-4.15.0-187-generic 4.15.0-187.198~16.04.1 linux-image-4.15.0-187-lowlatency 4.15.0-187.198~16.04.1 linux-image-aws-hwe 4.15.0.1136.123 linux-image-azure 4.15.0.1145.132 linux-image-gcp 4.15.0.1130.127 linux-image-generic-hwe-16.04 4.15.0.187.174 linux-image-gke 4.15.0.1130.127 linux-image-lowlatency-hwe-16.04 4.15.0.187.174 linux-image-oem 4.15.0.187.174 linux-image-oracle 4.15.0.1101.86 linux-image-virtual-hwe-16.04 4.15.0.187.174 Ubuntu 14.04 ESM: linux-image-4.15.0-1145-azure 4.15.0-1145.160~14.04.1 linux-image-azure 4.15.0.1145.114 Please note that fully mitigating processor vulnerabilities requires corresponding processor microcode/firmware updates. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. Bugs fixed (https://bugzilla.redhat.com/): 1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation 2024946 - Ingress Canary does not respect router sharding on default IngressController 2104825 - Installer creates unnecessary master_ingress_cluster_policy_controller security group rule 2108214 - Route status isn't always getting cleared with routeSelector updates 2108595 - etcd Dashboard should be removed on guest cluster of hypershift 2109193 - Power VS machine Processor is always defaulted to 0.5 2109887 - [UI] MultiClusterHub details after it's creation starts flickers, disappears and appears back (happened twice) 2110528 - Route status isn't always getting cleared with routeSelector updates 2111345 - should use the same value for AlertRelabelConfig with oc explain 2117424 - Backport: https://github.com/openshift/kubernetes/pull/1295 5. JIRA issues fixed (https://issues.jboss.org/): OCPBUGS-1007 - CVE-2021-3121 telemeter-container: [1924548] telemeter-container: gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation [openshift-4] OCPBUGS-1070 - Update ODC owners OCPBUGS-1104 - package-server-manager does not migrate packageserver CSV from v0.17.0 to v0.18.3 on OCP 4.8 -> 4.9 upgrade OCPBUGS-1145 - Bug 2085336 - [IPI-Azure] Fail to create the worker node which HyperVGenerations is V2 or V1 and vmNetworkingType is Accelerated OCPBUGS-1233 - [IPI] nodelink controller is not able to reconcile and match nodes and machines with logical interfaces defined by nmstate at baremetalhost creation OCPBUGS-1261 - Backport: https://github.com/openshift/kubernetes/pull/1295 OCPBUGS-393 - Setting disableNetworkDiagnostics: true does not persist when network-operator pod gets re-created OCPBUGS-455 - [vsphere] update install-config description for diskType OCPBUGS-524 - Plugin page error boundary message is not cleared after leaving page OCPBUGS-668 - Prefer local dns does not work expectedly on OCPv4.11 OCPBUGS-744 - [4.11] Spoke BMH stuck ?provisioning? after changing a BIOS attribute via the converged workflow OCPBUGS-746 - [4.11] Supermicro server FirmwareSchema CR does not contain allowable_values, attribute_type and read_only flag OCPBUGS-747 - [4.11] Disconnected IPI OCP cluster install on baremetal fails when hostname of master nodes does not include the text "master 6. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202208-23 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: Xen: Multiple Vulnerabilities Date: August 14, 2022 Bugs: #810341, #812485, #816882, #825354, #832039, #835401, #850802 ID: 202208-23 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======= Multiple vulnerabilities have been discovered in Xen, the worst of which could result in remote code execution (guest sandbox escape). Background ========= Xen is a bare-metal hypervisor. Affected packages ================ ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 app-emulation/xen < 4.15.3 >= 4.15.3 2 app-emulation/xen-tools < 4.15.3 >= 4.15.3 Description ========== Multiple vulnerabilities have been discovered in Xen. Please review the CVE identifiers referenced below for details. Impact ===== Please review the referenced CVE identifiers for details. Workaround ========= There is no known workaround at this time. Resolution ========= All Xen users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=app-emulation/xen-4.15.3" All Xen tools users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=app-emulation/xen-tools-4.15.3" References ========= [ 1 ] CVE-2021-28694 https://nvd.nist.gov/vuln/detail/CVE-2021-28694 [ 2 ] CVE-2021-28695 https://nvd.nist.gov/vuln/detail/CVE-2021-28695 [ 3 ] CVE-2021-28696 https://nvd.nist.gov/vuln/detail/CVE-2021-28696 [ 4 ] CVE-2021-28697 https://nvd.nist.gov/vuln/detail/CVE-2021-28697 [ 5 ] CVE-2021-28698 https://nvd.nist.gov/vuln/detail/CVE-2021-28698 [ 6 ] CVE-2021-28699 https://nvd.nist.gov/vuln/detail/CVE-2021-28699 [ 7 ] CVE-2021-28700 https://nvd.nist.gov/vuln/detail/CVE-2021-28700 [ 8 ] CVE-2021-28701 https://nvd.nist.gov/vuln/detail/CVE-2021-28701 [ 9 ] CVE-2021-28702 https://nvd.nist.gov/vuln/detail/CVE-2021-28702 [ 10 ] CVE-2021-28710 https://nvd.nist.gov/vuln/detail/CVE-2021-28710 [ 11 ] CVE-2022-21123 https://nvd.nist.gov/vuln/detail/CVE-2022-21123 [ 12 ] CVE-2022-21125 https://nvd.nist.gov/vuln/detail/CVE-2022-21125 [ 13 ] CVE-2022-21166 https://nvd.nist.gov/vuln/detail/CVE-2022-21166 [ 14 ] CVE-2022-23033 https://nvd.nist.gov/vuln/detail/CVE-2022-23033 [ 15 ] CVE-2022-23034 https://nvd.nist.gov/vuln/detail/CVE-2022-23034 [ 16 ] CVE-2022-23035 https://nvd.nist.gov/vuln/detail/CVE-2022-23035 [ 17 ] CVE-2022-26362 https://nvd.nist.gov/vuln/detail/CVE-2022-26362 [ 18 ] CVE-2022-26363 https://nvd.nist.gov/vuln/detail/CVE-2022-26363 [ 19 ] CVE-2022-26364 https://nvd.nist.gov/vuln/detail/CVE-2022-26364 [ 20 ] XSA-378 [ 21 ] XSA-379 [ 22 ] XSA-380 [ 23 ] XSA-382 [ 24 ] XSA-383 [ 25 ] XSA-384 [ 26 ] XSA-386 [ 27 ] XSA-390 [ 28 ] XSA-401 [ 29 ] XSA-402 [ 30 ] XSA-404 Availability =========== This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202208-23 Concerns? ======== Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ====== Copyright 2022 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5 . CVE-2022-21123, CVE-2022-21125, CVE-2022-21127, CVE-2022-21166 Various researchers discovered flaws in Intel processors, collectively referred to as MMIO Stale Data vulnerabilities, which may result in information leak to local users. For details please refer to https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html CVE-2022-21151 Alysa Milburn, Jason Brandt, Avishai Redelman and Nir Lavi discovered that for some Intel processors optimization removal or modification of security-critical code may result in information disclosure to local users. For the oldstable distribution (buster), these problems have been fixed in version 3.20220510.1~deb10u1. For the stable distribution (bullseye), these problems have been fixed in version 3.20220510.1~deb11u1. We recommend that you upgrade your intel-microcode packages. For the detailed security status of intel-microcode please refer to its security tracker page at: https://security-tracker.debian.org/tracker/intel-microcode Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmLFiNRfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0QsfQ/7BFnYhmBMr5u1iyXJY79QkOuBFij/I7N5doGb/5m/LTbUOKgHKlI3XKqr NHbWZWQZVO7gexkZIdGSY2RnCtVS1oNkKxNzuFVxkPjbsRpJJBAyPqoY6JogDjhM 18jXAyZqB5tfZdGohiHBeVDsQwP5M3IPTdG2USoLOwcwd5+BK8ZgdrLrREDHo9mA +VJU8fhGRpdminz5MR2NPenu5jgG2JVKAhFRC8ioy92umF/5c/C6wRAyQsRid4lZ i+lzWAOQbUzvUGlomDrjqtSEn0fVQR2A0VoU+5AQnln8fODQmSLOHo/Ti00RuUUL 8WLfrKnfimXvTWnUeWKLCnHIRCbzLBfPa1EPbCagkD7XDkcYd+MWLm0C6RhUvBPN p3U9AbWstO4z2RjldX1DYUVeCR5zQqBT6pAY6G14MqIvuqrAodi9p0jgjOchdCUZ Hv4H6b0F7QusCZrj1onfe4//CG5AmN0D8E/QKCKNBplJmciVg2o/8R0hTfaKDK8v NhUYBkEWnG0zUlo93Qkapqc00j5i7cbXKbzRV3zPa42WtypoS8yd/tftZ6y7yBpa lHZOAVcfdDcN7jm9U9ZV3tVCCs3Cu5wb3ZYoYyhfEZBpEgCQ7YEEPQffTq9Y3LMN 4IUiKp8LINReMEEfV8My7PB2fX8dvti2lEQ/pJfAC/XKNoassd0= =8N2y -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: kernel security, bug fix, and enhancement update Advisory ID: RHSA-2022:6460-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2022:6460 Issue date: 2022-09-13 CVE Names: CVE-2022-21123 CVE-2022-21125 CVE-2022-21166 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat CodeReady Linux Builder (v. 8) - aarch64, ppc64le, x86_64 Red Hat Enterprise Linux BaseOS (v. 8) - aarch64, noarch, ppc64le, s390x, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * Incomplete cleanup of multi-core shared buffers (aka SBDR) (CVE-2022-21123) * Incomplete cleanup of microarchitectural fill buffers (aka SBDS) (CVE-2022-21125) * Incomplete cleanup in specific special register write operations (aka DRPW) (CVE-2022-21166) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Bad page state in process qemu-kvm pfn:68a74600 (BZ#2081013) * slub corruption during LPM of hnv interface (BZ#2081250) * Affinity broken due to vector space exhaustion (BZ#2084646) * 'rmmod pmt_telemetry' panics on ADL-P IOTG (BZ#2091079) * Unable to boot RHEL-8.6 on Brazos max. config (Install is success) (BZ#2092241) * kernel crash after reboot of T14/G2 AMD laptop (mt7921e module) (BZ#2095654) * mt7921: free resources on pci_probe error path (BZ#2101684) * NLM should be more defensive if underlying FS changes fl_owner (BZ#2102099) * RHEL8/async-pf Guest call trace when reboot after postcopy migration with high stress workload (BZ#2105340) * execve exit tracepoint not called (BZ#2106662) * QProcess dead lock on kernel-4.18.0-358 (BZ#2107643) * KVM fix guest FPU uABI size to kvm_xsave (BZ#2107652) * KVM selftests fail to compile (BZ#2107655) * Some monitor have no display with AMD W6400 when boot into OS. (BZ#2109826) * Percpu counter usage is gradually getting increasing during podman container recreation. (BZ#2110039) * multipath failed to recover after EEH hit on flavafish adapter on Denali(qla2xxx/flavafish/RHEL8.6/Denali) (BZ#2110768) * soft lockups under heavy I/O load to ahci connected SSDs (BZ#2110772) * trouble re-assigning MACs to VFs, ice stricter than other drivers (BZ#2111936) * Intel MPI 2019.0 - mpirun stuck on latest kernel (BZ#2112030) * Multicast packets are not received by all VFs on the same port even though they have the same VLAN (BZ#2117026) * Hyper-V 2019 Dynamic Memory Problem hv_balloon (BZ#2117050) * kernel BUG at kernel/sched/deadline.c:1561! (BZ#2117410) * ALSA (sound) driver - update Intel SOF kcontrol code (BZ#2117732) * bridge over bond over ice ports has no connection (BZ#2118580) * Fix max VLANs available for VF (BZ#2118581) * offline selftest failed (BZ#2118582) * INTEL NVMUpdate utility ver 3.20 is failing to update firmware on E810-XXVDA4T (WPC) (BZ#2118583) * VM configured with failover interface will coredump after been migrating from source host to target host(only iavf driver) (BZ#2118705) * Fix max VLANs available for untrusted VF (BZ#2118707) * Softlockup on infinite loop in task_get_css() for a CSS_DYING cpuset (BZ#2120776) Enhancement(s): * KVM Sapphire Rapids (SPR) AMX Instructions (BZ#2088287) * KVM Sapphire Rapids (SPR) AMX Instructions part2 (BZ#2088288) * ice: Driver Update (BZ#2102359) * iavf: Driver Update (BZ#2102360) * iommu/vt-d: Make DMAR_UNITS_SUPPORTED a config setting (BZ#2112983) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 2090237 - CVE-2022-21123 hw: cpu: Incomplete cleanup of multi-core shared buffers (aka SBDR) 2090240 - CVE-2022-21125 hw: cpu: Incomplete cleanup of microarchitectural fill buffers (aka SBDS) 2090241 - CVE-2022-21166 hw: cpu: Incomplete cleanup in specific special register write operations (aka DRPW) 6. Package List: Red Hat Enterprise Linux BaseOS (v. 8): Source: kernel-4.18.0-372.26.1.el8_6.src.rpm aarch64: bpftool-4.18.0-372.26.1.el8_6.aarch64.rpm bpftool-debuginfo-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-core-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-cross-headers-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-debug-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-debug-core-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-debug-debuginfo-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-debug-devel-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-debug-modules-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-debug-modules-extra-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-debuginfo-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-debuginfo-common-aarch64-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-devel-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-headers-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-modules-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-modules-extra-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-tools-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-tools-debuginfo-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-tools-libs-4.18.0-372.26.1.el8_6.aarch64.rpm perf-4.18.0-372.26.1.el8_6.aarch64.rpm perf-debuginfo-4.18.0-372.26.1.el8_6.aarch64.rpm python3-perf-4.18.0-372.26.1.el8_6.aarch64.rpm python3-perf-debuginfo-4.18.0-372.26.1.el8_6.aarch64.rpm noarch: kernel-abi-stablelists-4.18.0-372.26.1.el8_6.noarch.rpm kernel-doc-4.18.0-372.26.1.el8_6.noarch.rpm ppc64le: bpftool-4.18.0-372.26.1.el8_6.ppc64le.rpm bpftool-debuginfo-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-core-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-cross-headers-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-debug-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-debug-core-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-debug-debuginfo-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-debug-devel-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-debug-modules-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-debug-modules-extra-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-debuginfo-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-devel-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-headers-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-modules-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-modules-extra-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-tools-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-tools-debuginfo-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-tools-libs-4.18.0-372.26.1.el8_6.ppc64le.rpm perf-4.18.0-372.26.1.el8_6.ppc64le.rpm perf-debuginfo-4.18.0-372.26.1.el8_6.ppc64le.rpm python3-perf-4.18.0-372.26.1.el8_6.ppc64le.rpm python3-perf-debuginfo-4.18.0-372.26.1.el8_6.ppc64le.rpm s390x: bpftool-4.18.0-372.26.1.el8_6.s390x.rpm bpftool-debuginfo-4.18.0-372.26.1.el8_6.s390x.rpm kernel-4.18.0-372.26.1.el8_6.s390x.rpm kernel-core-4.18.0-372.26.1.el8_6.s390x.rpm kernel-cross-headers-4.18.0-372.26.1.el8_6.s390x.rpm kernel-debug-4.18.0-372.26.1.el8_6.s390x.rpm kernel-debug-core-4.18.0-372.26.1.el8_6.s390x.rpm kernel-debug-debuginfo-4.18.0-372.26.1.el8_6.s390x.rpm kernel-debug-devel-4.18.0-372.26.1.el8_6.s390x.rpm kernel-debug-modules-4.18.0-372.26.1.el8_6.s390x.rpm kernel-debug-modules-extra-4.18.0-372.26.1.el8_6.s390x.rpm kernel-debuginfo-4.18.0-372.26.1.el8_6.s390x.rpm kernel-debuginfo-common-s390x-4.18.0-372.26.1.el8_6.s390x.rpm kernel-devel-4.18.0-372.26.1.el8_6.s390x.rpm kernel-headers-4.18.0-372.26.1.el8_6.s390x.rpm kernel-modules-4.18.0-372.26.1.el8_6.s390x.rpm kernel-modules-extra-4.18.0-372.26.1.el8_6.s390x.rpm kernel-tools-4.18.0-372.26.1.el8_6.s390x.rpm kernel-tools-debuginfo-4.18.0-372.26.1.el8_6.s390x.rpm kernel-zfcpdump-4.18.0-372.26.1.el8_6.s390x.rpm kernel-zfcpdump-core-4.18.0-372.26.1.el8_6.s390x.rpm kernel-zfcpdump-debuginfo-4.18.0-372.26.1.el8_6.s390x.rpm kernel-zfcpdump-devel-4.18.0-372.26.1.el8_6.s390x.rpm kernel-zfcpdump-modules-4.18.0-372.26.1.el8_6.s390x.rpm kernel-zfcpdump-modules-extra-4.18.0-372.26.1.el8_6.s390x.rpm perf-4.18.0-372.26.1.el8_6.s390x.rpm perf-debuginfo-4.18.0-372.26.1.el8_6.s390x.rpm python3-perf-4.18.0-372.26.1.el8_6.s390x.rpm python3-perf-debuginfo-4.18.0-372.26.1.el8_6.s390x.rpm x86_64: bpftool-4.18.0-372.26.1.el8_6.x86_64.rpm bpftool-debuginfo-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-core-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-cross-headers-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-debug-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-debug-core-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-debug-debuginfo-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-debug-devel-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-debug-modules-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-debug-modules-extra-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-debuginfo-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-debuginfo-common-x86_64-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-devel-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-headers-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-modules-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-modules-extra-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-tools-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-tools-debuginfo-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-tools-libs-4.18.0-372.26.1.el8_6.x86_64.rpm perf-4.18.0-372.26.1.el8_6.x86_64.rpm perf-debuginfo-4.18.0-372.26.1.el8_6.x86_64.rpm python3-perf-4.18.0-372.26.1.el8_6.x86_64.rpm python3-perf-debuginfo-4.18.0-372.26.1.el8_6.x86_64.rpm Red Hat CodeReady Linux Builder (v. 8): aarch64: bpftool-debuginfo-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-debug-debuginfo-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-debuginfo-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-debuginfo-common-aarch64-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-tools-debuginfo-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-tools-libs-devel-4.18.0-372.26.1.el8_6.aarch64.rpm perf-debuginfo-4.18.0-372.26.1.el8_6.aarch64.rpm python3-perf-debuginfo-4.18.0-372.26.1.el8_6.aarch64.rpm ppc64le: bpftool-debuginfo-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-debug-debuginfo-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-debuginfo-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-tools-debuginfo-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-tools-libs-devel-4.18.0-372.26.1.el8_6.ppc64le.rpm perf-debuginfo-4.18.0-372.26.1.el8_6.ppc64le.rpm python3-perf-debuginfo-4.18.0-372.26.1.el8_6.ppc64le.rpm x86_64: bpftool-debuginfo-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-debug-debuginfo-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-debuginfo-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-debuginfo-common-x86_64-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-tools-debuginfo-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-tools-libs-devel-4.18.0-372.26.1.el8_6.x86_64.rpm perf-debuginfo-4.18.0-372.26.1.el8_6.x86_64.rpm python3-perf-debuginfo-4.18.0-372.26.1.el8_6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2022-21123 https://access.redhat.com/security/cve/CVE-2022-21125 https://access.redhat.com/security/cve/CVE-2022-21166 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYyCB1NzjgjWX9erEAQjx1g/+KpIc2rESQgtzICCW50Ha+ZjaOZiuIgGV 1wDzgsyj7JRxGOIhGY3edJp7sdtoT0+CoWTdjENZrNhQlQ9UhRSpJ+8vdGy5WooO fwwKBffteRMEl8YTO/U8fstclEKXK3MB93ZxEHgS0L3UQY/AUU5XqSzB4a4rV9RJ DpFQcnw3dHIrtMKHs4HMrm8+Q8ezq9UmVbl472ecnfmNXfHDhOmUGGlUrT22SX9p Zn/UXCiWZxIt+Vh2uTrIgs4hiSJPAqD/lGHjLQpaR26uciZnndLui2s4W91F7yN4 ZifRDwrSAMtsRoln7Z8HL6H59tw4vHwAY1rD5ATwk9EqhRtaetE+v0hzM+BRBhri dpZnKUhMiUDNTUKqmpbBZjh4IuSKI6AkaQenFnMQWTp027B6o0EjhqpiEdLaA0R/ pYewm2OKbulyoUeVhC5GOMX6g8ckGa5h2o4Fr+fkaptELQN1VniYEu88O7pRqaqR lW3MrcYIEowDxyiMLehgtIxjyawzfmi0fficXzCf8xEXm8fmqlrXu4lfhKV4g3WI Y9j8INFYc4inopUBsQM1zXWV00nCDxAvaYPhOYI0VjO11jxOCOcBheOlwS1sseOv Bjram7oqf2DuVSINeTAgbHMLMA4AGEcNMsOAN/mwdq6ZBpEYmCf48pvZwQscW7qv a685GRAjoyY= =4AwP -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . Description: Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.8.53. See the following advisory for the RPM packages for this release: https://access.redhat.com/errata/RHBA-2022:7873 Space precludes documenting all of the container images in this advisory. Solution: For OpenShift Container Platform 4.8 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html You may download the oc tool and use it to inspect release image metadata for x86_64, s390x, and ppc64le architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags The sha values for the release are: (For x86_64 architecture) The image digest is sha256:ac2bbfa7036c64bbdb44f9a74df3dbafcff1b851d812bf2a48c4fabcac3c7a53 (For s390x architecture) The image digest is sha256:ac2c74a664257cea299126d4f789cdf9a5a4efc4a4e8c2361b943374d4eb21e4 (For ppc64le architecture) The image digest is sha256:53adc42ed30ad39d7117837dbf5a6db6943a8f0b3b61bc0d046b83394f5c28b2 All OpenShift Container Platform 4.8 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html 4. Bugs fixed (https://bugzilla.redhat.com/): 2077100 - Console backend check for Web Terminal Operator incorrectly returns HTTP 204 2092918 - CVE-2022-30321 go-getter: unsafe download (issue 1 of 3) 2092923 - CVE-2022-30322 go-getter: unsafe download (issue 2 of 3) 2092925 - CVE-2022-30323 go-getter: unsafe download (issue 3 of 3) 2092928 - CVE-2022-26945 go-getter: command injection vulnerability 5. JIRA issues fixed (https://issues.jboss.org/): OCPBUGS-2205 - Prefer local dns does not work expectedly on OCPv4.8 OCPBUGS-2347 - [cluster-api-provider-baremetal] fix 4.8 build OCPBUGS-2577 - [4.8] ETCD Operator goes degraded when a second internal node ip is added OCPBUGS-2773 - e2e tests: Installs Red Hat Integration - 3scale operator test is failing due to change of Operator name OCPBUGS-2989 - [4.8] cri-o should report the stage of container and pod creation it's stuck at 6. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. Bugs fixed (https://bugzilla.redhat.com/): 2094982 - CVE-2022-1996 go-restful: Authorization Bypass Through User-Controlled Key 2130218 - 4.9.7 containers 5

Trust: 2.52

sources: NVD: CVE-2022-21125 // JVNDB: JVNDB-2022-011636 // VULHUB: VHN-406836 // PACKETSTORM: 169411 // PACKETSTORM: 168694 // PACKETSTORM: 167549 // PACKETSTORM: 168461 // PACKETSTORM: 168076 // PACKETSTORM: 169316 // PACKETSTORM: 168355 // PACKETSTORM: 169941 // PACKETSTORM: 169997

AFFECTED PRODUCTS

vendor:debianmodel:linuxscope:eqversion:11.0

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:35

Trust: 1.0

vendor:intelmodel:sgx sdkscope:ltversion:2.16.100.3

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:36

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:intelmodel:sgx pswscope:ltversion:2.16.100.3

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:xenmodel:xenscope:eqversion:*

Trust: 1.0

vendor:intelmodel:sgx sdkscope:ltversion:2.17.100.3

Trust: 1.0

vendor:intelmodel:sgx pswscope:ltversion:2.17.100.3

Trust: 1.0

vendor:vmwaremodel:esxiscope:eqversion:7.0

Trust: 1.0

vendor:intelmodel:sgx dcapscope:ltversion:1.14.100.3

Trust: 1.0

vendor:インテルmodel:intel sgx dcapscope: - version: -

Trust: 0.8

vendor:xen プロジェクトmodel:xenscope: - version: -

Trust: 0.8

vendor:インテルmodel:intel sgx pswscope: - version: -

Trust: 0.8

vendor:vmwaremodel:esxiscope: - version: -

Trust: 0.8

vendor:インテルmodel:intel sgx sdkscope: - version: -

Trust: 0.8

vendor:debianmodel:gnu/linuxscope: - version: -

Trust: 0.8

vendor:fedoramodel:fedorascope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-011636 // NVD: CVE-2022-21125

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-21125
value: MEDIUM

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2022-21125
value: MEDIUM

Trust: 1.0

NVD: CVE-2022-21125
value: MEDIUM

Trust: 0.8

VULHUB: VHN-406836
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2022-21125
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-406836
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2022-21125
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.1

Trust: 2.0

NVD: CVE-2022-21125
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-406836 // JVNDB: JVNDB-2022-011636 // NVD: CVE-2022-21125 // NVD: CVE-2022-21125

PROBLEMTYPE DATA

problemtype:CWE-459

Trust: 1.1

problemtype:incomplete cleanup (CWE-459) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-406836 // JVNDB: JVNDB-2022-011636 // NVD: CVE-2022-21125

THREAT TYPE

local

Trust: 0.1

sources: PACKETSTORM: 167549

TYPE

code execution

Trust: 0.2

sources: PACKETSTORM: 168076 // PACKETSTORM: 169941

PATCH

title:INTEL-SA-00615url:https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html

Trust: 0.8

sources: JVNDB: JVNDB-2022-011636

EXTERNAL IDS

db:NVDid:CVE-2022-21125

Trust: 3.6

db:OPENWALLid:OSS-SECURITY/2022/06/16/1

Trust: 1.9

db:JVNid:JVNVU94721039

Trust: 0.8

db:JVNid:JVNVU99464755

Trust: 0.8

db:ICS CERTid:ICSA-23-166-11

Trust: 0.8

db:JVNDBid:JVNDB-2022-011636

Trust: 0.8

db:PACKETSTORMid:168076

Trust: 0.2

db:PACKETSTORMid:169941

Trust: 0.2

db:PACKETSTORMid:169997

Trust: 0.2

db:PACKETSTORMid:168461

Trust: 0.2

db:PACKETSTORMid:168694

Trust: 0.2

db:PACKETSTORMid:167549

Trust: 0.2

db:PACKETSTORMid:168355

Trust: 0.2

db:PACKETSTORMid:167785

Trust: 0.1

db:PACKETSTORMid:169719

Trust: 0.1

db:PACKETSTORMid:169688

Trust: 0.1

db:PACKETSTORMid:168294

Trust: 0.1

db:PACKETSTORMid:169690

Trust: 0.1

db:PACKETSTORMid:168021

Trust: 0.1

db:PACKETSTORMid:168018

Trust: 0.1

db:PACKETSTORMid:168503

Trust: 0.1

db:PACKETSTORMid:169695

Trust: 0.1

db:PACKETSTORMid:167862

Trust: 0.1

db:PACKETSTORMid:168364

Trust: 0.1

db:PACKETSTORMid:167692

Trust: 0.1

db:PACKETSTORMid:167545

Trust: 0.1

db:PACKETSTORMid:170226

Trust: 0.1

db:VULHUBid:VHN-406836

Trust: 0.1

db:PACKETSTORMid:169411

Trust: 0.1

db:PACKETSTORMid:169316

Trust: 0.1

sources: VULHUB: VHN-406836 // PACKETSTORM: 169411 // PACKETSTORM: 168694 // PACKETSTORM: 167549 // PACKETSTORM: 168461 // PACKETSTORM: 168076 // PACKETSTORM: 169316 // PACKETSTORM: 168355 // PACKETSTORM: 169941 // PACKETSTORM: 169997 // JVNDB: JVNDB-2022-011636 // NVD: CVE-2022-21125

REFERENCES

url:http://www.openwall.com/lists/oss-security/2022/06/16/1

Trust: 1.9

url:https://nvd.nist.gov/vuln/detail/cve-2022-21125

Trust: 1.7

url:https://security.gentoo.org/glsa/202208-23

Trust: 1.2

url:http://xenbits.xen.org/xsa/advisory-404.html

Trust: 1.1

url:https://security.netapp.com/advisory/ntap-20220624-0008/

Trust: 1.1

url:https://www.debian.org/security/2022/dsa-5173

Trust: 1.1

url:https://www.debian.org/security/2022/dsa-5178

Trust: 1.1

url:https://www.debian.org/security/2022/dsa-5184

Trust: 1.1

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html

Trust: 1.1

url:https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/t4p2kjyl74kglhe4jzetvw7pzh6ziaba/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/fhtew3rxu2gw6s3rcpqg4vnczgi3tosv/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/rkrxz4lhgcgmog24zcejny6r2bts4s2q/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/mcvomhbqrh4kp7in6u24cw7f2d2l5kbs/

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2022-21166

Trust: 0.9

url:https://nvd.nist.gov/vuln/detail/cve-2022-21123

Trust: 0.9

url:https://jvn.jp/vu/jvnvu94721039/index.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu99464755/index.html

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-166-11

Trust: 0.8

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.6

url:https://bugzilla.redhat.com/):

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2022-21166

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2022-21123

Trust: 0.6

url:https://access.redhat.com/security/team/contact/

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2022-21125

Trust: 0.6

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2022-2588

Trust: 0.4

url:https://access.redhat.com/articles/11258

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2022-2588

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-45486

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-45486

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2021-45485

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-45485

Trust: 0.3

url:https://access.redhat.com/security/team/key/

Trust: 0.3

url:https://issues.jboss.org/):

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-41974

Trust: 0.2

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/t4p2kjyl74kglhe4jzetvw7pzh6ziaba/

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/rkrxz4lhgcgmog24zcejny6r2bts4s2q/

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/fhtew3rxu2gw6s3rcpqg4vnczgi3tosv/

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/mcvomhbqrh4kp7in6u24cw7f2d2l5kbs/

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:6991

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:6872

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws-5.4/5.4.0-1080.87~18.04.1

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5485-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/5.13.0-1031.37

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-ibm-5.4/5.4.0-1028.32~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/5.13.0-1030.33

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gke/5.15.0-1010.13

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-ibm/5.4.0-1028.32

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/5.4.0-1085.90

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1101.112

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/5.15.0-1011.15

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe-5.13/5.13.0-51.58~20.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gkeop-5.4/5.4.0-1048.51~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure-5.13/5.13.0-1031.37~20.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/5.4.0-1070.75

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp-5.4/5.4.0-1080.87~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1136.147

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1122.127

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gkeop/5.4.0-1048.51

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-ibm/5.15.0-1009.11

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/5.13.0-1033.40

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/5.13.0-1036.43

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/5.15.0-1012.14

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure-4.15/4.15.0-1145.160

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure-fde/5.4.0-1085.90+cvm1.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.15.0-187.198

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/5.13.0-51.58

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/5.15.0-39.42

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-dell300x/4.15.0-1048.53

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp-4.15/4.15.0-1130.146

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle-5.4/5.4.0-1078.86~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure-5.4/5.4.0-1085.90~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/5.15.0-1010.15

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/5.4.0-1080.87

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gke/5.4.0-1076.82

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle-5.13/5.13.0-1036.43~20.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/5.4.0-1078.86

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/5.4.0-120.136

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws-5.13/5.13.0-1031.35~20.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/5.15.0-1012.15

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp-5.13/5.13.0-1033.40~20.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gke-5.4/5.4.0-1076.82~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-intel-5.13/5.13.0-1017.19

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/5.4.0-1080.87

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe-5.4/5.4.0-120.136~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/5.13.0-1031.35

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-intel-iotg/5.15.0-1010.14

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/5.15.0-1013.17

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-lowlatency/5.15.0-39.42

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-28199

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0391

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-20107

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3121

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-34903

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:6536

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3121

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-30629

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-20107

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:6535

Trust: 0.1

url:https://github.com/openshift/kubernetes/pull/1295

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-0391

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-28199

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-30629

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-34903

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-26364

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-26363

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-28697

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-28701

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-28696

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-26362

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-23033

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-23035

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-28710

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-23034

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-28698

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-28694

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-28699

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-28695

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-28700

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-28702

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-21151

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

url:https://security-tracker.debian.org/tracker/intel-microcode

Trust: 0.1

url:https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-21127

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:6460

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-30322

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-21626

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-21626

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-30322

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-30321

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-21628

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:7874

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-39399

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-30321

Trust: 0.1

url:https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-21619

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-26945

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-21618

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-21624

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-21624

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-21618

Trust: 0.1

url:https://access.redhat.com/errata/rhba-2022:7873

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-21628

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-21619

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-30323

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-26945

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-40674

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-38177

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-40674

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1996

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1996

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-41974

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:8609

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3515

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3515

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-38177

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-38178

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-38178

Trust: 0.1

sources: VULHUB: VHN-406836 // PACKETSTORM: 169411 // PACKETSTORM: 168694 // PACKETSTORM: 167549 // PACKETSTORM: 168461 // PACKETSTORM: 168076 // PACKETSTORM: 169316 // PACKETSTORM: 168355 // PACKETSTORM: 169941 // PACKETSTORM: 169997 // JVNDB: JVNDB-2022-011636 // NVD: CVE-2022-21125

CREDITS

Red Hat

Trust: 0.6

sources: PACKETSTORM: 169411 // PACKETSTORM: 168694 // PACKETSTORM: 168461 // PACKETSTORM: 168355 // PACKETSTORM: 169941 // PACKETSTORM: 169997

SOURCES

db:VULHUBid:VHN-406836
db:PACKETSTORMid:169411
db:PACKETSTORMid:168694
db:PACKETSTORMid:167549
db:PACKETSTORMid:168461
db:PACKETSTORMid:168076
db:PACKETSTORMid:169316
db:PACKETSTORMid:168355
db:PACKETSTORMid:169941
db:PACKETSTORMid:169997
db:JVNDBid:JVNDB-2022-011636
db:NVDid:CVE-2022-21125

LAST UPDATE DATE

2026-03-25T21:05:57.753000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-406836date:2022-08-19T00:00:00
db:JVNDBid:JVNDB-2022-011636date:2023-08-23T06:27:00
db:NVDid:CVE-2022-21125date:2025-05-05T17:17:37.500

SOURCES RELEASE DATE

db:VULHUBid:VHN-406836date:2022-06-15T00:00:00
db:PACKETSTORMid:169411date:2022-10-18T22:30:59
db:PACKETSTORMid:168694date:2022-10-11T16:07:13
db:PACKETSTORMid:167549date:2022-06-20T16:17:04
db:PACKETSTORMid:168461date:2022-09-22T15:50:52
db:PACKETSTORMid:168076date:2022-08-15T16:03:21
db:PACKETSTORMid:169316date:2022-07-28T19:12:00
db:PACKETSTORMid:168355date:2022-09-13T15:42:59
db:PACKETSTORMid:169941date:2022-11-18T14:28:39
db:PACKETSTORMid:169997date:2022-11-23T15:18:44
db:JVNDBid:JVNDB-2022-011636date:2023-08-23T00:00:00
db:NVDid:CVE-2022-21125date:2022-06-15T20:15:17.547