ID

VAR-202203-0045


CVE

CVE-2022-0001


TITLE

Ubuntu Security Notice USN-5362-1

Trust: 0.1

sources: PACKETSTORM: 166569

DESCRIPTION

Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access. A flaw was found in hw. The Branch History Injection (BHI) describes a specific form of intra-mode BTI. This flaw allows an unprivileged malicious user to manipulate the branch history before transitioning to supervisor or VMX root mode. This issue is an effort to cause an indirect branch predictor to select a specific predictor entry for an indirect branch, and a disclosure gadget at the predicted target will transiently execute. This execution is possible since the relevant branch history may contain branches taken in previous security contexts, and in particular, in other predictor modes. ========================================================================= Ubuntu Security Notice USN-5362-1 April 01, 2022 linux-intel-5.13 vulnerabilities ========================================================================= A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-intel-5.13: Linux kernel for Intel IOTG Details: Nick Gregory discovered that the Linux kernel incorrectly handled network offload functionality. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2022-25636) Enrico Barberis, Pietro Frigo, Marius Muench, Herbert Bos, and Cristiano Giuffrida discovered that hardware mitigations added by ARM to their processors to address Spectre-BTI were insufficient. A local attacker could potentially use this to expose sensitive information. (CVE-2022-23960) It was discovered that the BPF verifier in the Linux kernel did not properly restrict pointer types in certain situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-23222) Max Kellermann discovered that the Linux kernel incorrectly handled Unix pipes. A local attacker could potentially use this to modify any file that could be opened for reading. (CVE-2022-0847) Yiqi Sun and Kevin Wang discovered that the cgroups implementation in the Linux kernel did not properly restrict access to the cgroups v1 release_agent feature. A local attacker could use this to gain administrative privileges. (CVE-2022-0492) William Liu and Jamie Hill-Daniel discovered that the file system context functionality in the Linux kernel contained an integer underflow vulnerability, leading to an out-of-bounds write. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-0185) Enrico Barberis, Pietro Frigo, Marius Muench, Herbert Bos, and Cristiano Giuffrida discovered that hardware mitigations added by Intel to their processors to address Spectre-BTI were insufficient. A local attacker could potentially use this to expose sensitive information. (CVE-2022-0001) Jann Horn discovered a race condition in the Unix domain socket implementation in the Linux kernel that could result in a read-after-free. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-4083) It was discovered that the NFS server implementation in the Linux kernel contained an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-4090) Kirill Tkhai discovered that the XFS file system implementation in the Linux kernel did not calculate size correctly when pre-allocating space in some situations. A local attacker could use this to expose sensitive information. (CVE-2021-4155) It was discovered that the AMD Radeon GPU driver in the Linux kernel did not properly validate writes in the debugfs file system. A privileged attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-42327) Sushma Venkatesh Reddy discovered that the Intel i915 graphics driver in the Linux kernel did not perform a GPU TLB flush in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2022-0330) Samuel Page discovered that the Transparent Inter-Process Communication (TIPC) protocol implementation in the Linux kernel contained a stack-based buffer overflow. A remote attacker could use this to cause a denial of service (system crash) for systems that have a TIPC bearer configured. (CVE-2022-0435) It was discovered that the KVM implementation for s390 systems in the Linux kernel did not properly prevent memory operations on PVM guests that were in non-protected mode. A local attacker could use this to obtain unauthorized memory write access. (CVE-2022-0516) It was discovered that the ICMPv6 implementation in the Linux kernel did not properly deallocate memory in certain situations. A remote attacker could possibly use this to cause a denial of service (memory exhaustion). (CVE-2022-0742) It was discovered that the VMware Virtual GPU driver in the Linux kernel did not properly handle certain failure conditions, leading to a stale entry in the file descriptor table. A local attacker could use this to expose sensitive information or possibly gain administrative privileges. (CVE-2022-22942) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: linux-image-5.13.0-1010-intel 5.13.0-1010.10 linux-image-intel 5.13.0.1010.11 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5362-1 CVE-2021-4083, CVE-2021-4090, CVE-2021-4155, CVE-2021-42327, CVE-2022-0001, CVE-2022-0185, CVE-2022-0330, CVE-2022-0435, CVE-2022-0492, CVE-2022-0516, CVE-2022-0742, CVE-2022-0847, CVE-2022-22942, CVE-2022-23222, CVE-2022-23960, CVE-2022-25636 Package Information: https://launchpad.net/ubuntu/+source/linux-intel-5.13/5.13.0-1010.10 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat Advanced Cluster Management 2.4.5 security updates and bug fixes Advisory ID: RHSA-2022:5201-01 Product: Red Hat ACM Advisory URL: https://access.redhat.com/errata/RHSA-2022:5201 Issue date: 2022-06-27 CVE Names: CVE-2018-25032 CVE-2020-0404 CVE-2020-4788 CVE-2020-13974 CVE-2020-19131 CVE-2020-27820 CVE-2021-0941 CVE-2021-3612 CVE-2021-3634 CVE-2021-3669 CVE-2021-3695 CVE-2021-3696 CVE-2021-3697 CVE-2021-3737 CVE-2021-3743 CVE-2021-3744 CVE-2021-3752 CVE-2021-3759 CVE-2021-3764 CVE-2021-3772 CVE-2021-3773 CVE-2021-4002 CVE-2021-4037 CVE-2021-4083 CVE-2021-4157 CVE-2021-4189 CVE-2021-4197 CVE-2021-4203 CVE-2021-20322 CVE-2021-21781 CVE-2021-25219 CVE-2021-26401 CVE-2021-29154 CVE-2021-37159 CVE-2021-38185 CVE-2021-41617 CVE-2021-41864 CVE-2021-42739 CVE-2021-43056 CVE-2021-43389 CVE-2021-43565 CVE-2021-43976 CVE-2021-44733 CVE-2021-45485 CVE-2021-45486 CVE-2022-0001 CVE-2022-0002 CVE-2022-0286 CVE-2022-0322 CVE-2022-1011 CVE-2022-1271 CVE-2022-21803 CVE-2022-23806 CVE-2022-24450 CVE-2022-24785 CVE-2022-25645 CVE-2022-28733 CVE-2022-28734 CVE-2022-28735 CVE-2022-28736 CVE-2022-28737 CVE-2022-29526 CVE-2022-29810 ===================================================================== 1. Summary: Red Hat Advanced Cluster Management for Kubernetes 2.4.5 General Availability release images, which fix bugs and update container images. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section. 2. Description: Red Hat Advanced Cluster Management for Kubernetes 2.4.5 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which apply security fixes and fix several bugs. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release: https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/ Security fixes: * golang.org/x/crypto: empty plaintext packet causes panic (CVE-2021-43565) * nconf: Prototype pollution in memory store (CVE-2022-21803) * golang: crypto/elliptic IsOnCurve returns true for invalid field elements (CVE-2022-23806) * nats-server: misusing the "dynamically provisioned sandbox accounts" feature authenticated user can obtain the privileges of the System account (CVE-2022-24450) * Moment.js: Path traversal in moment.locale (CVE-2022-24785) * dset: Prototype Pollution in dset (CVE-2022-25645) * golang: syscall: faccessat checks wrong group (CVE-2022-29526) * go-getter: writes SSH credentials into logfile, exposing sensitive credentials to local uses (CVE-2022-29810) Bug fixes: * Trying to create a new cluster on vSphere and no feedback, stuck in "creating" (BZ# 1937078) * Wrong message is displayed when GRC fails to connect to an Ansible Tower (BZ# 2051752) * multicluster_operators_hub_subscription issues due to /tmp usage (BZ# 2052702) * Create Cluster, Worker Pool 2 zones do not load options that relate to the selected Region field (BZ# 2054954) * Changing the multiclusterhub name other than the default name keeps the version in the web console loading (BZ# 2059822) * search-redisgraph-0 generating massive amount of logs after 2.4.2 upgrade (BZ# 2065318) * Uninstall pod crashed when destroying Azure Gov cluster in ACM (BZ# 2073562) * Deprovisioned clusters not filtered out by discovery controller (BZ# 2075594) * When deleting a secret for a Helm application, duplicate errors show up in topology (BZ# 2075675) * Changing existing placement rules does not change YAML file Regression (BZ# 2075724) * Editing Helm Argo Applications does not Prune Old Resources (BZ# 2079906) * Failed to delete the requested resource [404] error appears after subscription is deleted and its placement rule is used in the second subscription (BZ# 2080713) * Typo in the logs when Deployable is updated in the subscription namespace (BZ# 2080960) * After Argo App Sets are created in an Upgraded Environment, the Clusters column does not indicate the clusters (BZ# 2080716) * RHACM 2.4.5 images (BZ# 2081438) * Performance issue to get secret in claim-controller (BZ# 2081908) * Failed to provision openshift 4.10 on bare metal (BZ# 2094109) 3. Solution: For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on installing this update: https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html-single/install/index#installing 4. Bugs fixed (https://bugzilla.redhat.com/): 1937078 - Trying to create a new cluster on vSphere and no feedback, stuck in "creating" 2030787 - CVE-2021-43565 golang.org/x/crypto: empty plaintext packet causes panic 2051752 - Wrong message is displayed when GRC fails to connect to an ansible tower 2052573 - CVE-2022-24450 nats-server: misusing the "dynamically provisioned sandbox accounts" feature authenticated user can obtain the privileges of the System account 2052702 - multicluster_operators_hub_subscription issues due to /tmp usage 2053429 - CVE-2022-23806 golang: crypto/elliptic IsOnCurve returns true for invalid field elements 2054954 - Create Cluster, Worker Pool 2 zones do not load options that relate to the selected Region field 2059822 - Changing the multiclusterhub name other than the default name keeps the version in the web console loading. 2065318 - search-redisgraph-0 generating massive amount of logs after 2.4.2 upgrade 2072009 - CVE-2022-24785 Moment.js: Path traversal in moment.locale 2073562 - Uninstall pod crashed when destroying Azure Gov cluster in ACM 2074689 - CVE-2022-21803 nconf: Prototype pollution in memory store 2075594 - Deprovisioned clusters not filtered out by discovery controller 2075675 - When deleting a secret for a Helm application, duplicate errors show up in topology 2075724 - Changing existing placement rules does not change YAML file 2079906 - Editing Helm Argo Applications does not Prune Old Resources 2080279 - CVE-2022-29810 go-getter: writes SSH credentials into logfile, exposing sensitive credentials to local uses 2080713 - Failed to delete the requested resource [404] error appears after subscription is deleted and it's placement rule is used in the second subscription [Upgrade] 2080716 - After Argo App Sets are created in an Upgraded Environment, the Clusters column does not indicate the clusters 2080847 - CVE-2022-25645 dset: Prototype Pollution in dset 2080960 - Typo in the logs when Deployable is updated in the subscription namespace 2081438 - RHACM 2.4.5 images 2081908 - Performance issue to get secret in claim-controller 2084085 - CVE-2022-29526 golang: syscall: faccessat checks wrong group 2094109 - Failed to provision openshift 4.10 on bare metal 5. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYrpMwtzjgjWX9erEAQjpNBAAojYFQ2xqCBz/oyUXwGa5Z9S7DMVcDWkY 739hNxw16fLEyZ+exPG99RqymQqtN/pGsuYlNp8qgLcRE49qcLuHUrBESQE5B+jA nloxxZPPyadkgZ4hW7c2mNPwJ0kxRbWKzoLM2ItXChnJ5AxsegtuTjUYRAd6ULym j05rvJSnRKkMrdYCKZRlVjkGEUPq7Y1mBdRBrCSiFnMWJIeffyLxjdvSK1r9wV3T 7RSwAYJw1ygUmXvsqlx7jC0P+rVFrIVDbb/c+/HDc5LoQ7kVs4OMhy+onb+u1gaf G4qGuMHxq2UMmsebROP7Oues250wTgnML8Cfz+7JtO54BVKIpgWu7t5wx01RHKPR xiux74Ole7SEA+eKVooDUaT8BD35Xm0tT1yVhy++5crDlrGU7/IAgOyUbQLsfhmr xCDF3SNpbQZhclYc2pgEzgV9FHn2kEgV1Zk5VeeDaP2EWGJcT1gU5BfY8NOXuVM3 boPs6QuGZpDTYC+xD0i/W3TywuLzRcyTZq3nzi2hiW1rDdkJQasrgvIsw4emUOnv /mSyZZkC0jWnCJ1GiOcGuDDReqJo5UD3M2FYD23uJiPpEVDTp02DmrbW9r+8pU9D mp8U9kpnkphyAlYGzAz1DpfxUcTWt0jalqejG/VlaqDVhsY9bynqGj9U9cDWWubx dWwV9H3BFpY= =diO0 -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . Summary: The Migration Toolkit for Containers (MTC) 1.7.2 is now available. Description: The Migration Toolkit for Containers (MTC) enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Security Fix(es) from Bugzilla: * nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807) * node-fetch: exposure of sensitive information to an unauthorized actor (CVE-2022-0235) * follow-redirects: Exposure of Sensitive Information via Authorization Header leak (CVE-2022-0536) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Solution: For details on how to install and use MTC, refer to: https://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html 4. Bugs fixed (https://bugzilla.redhat.com/): 2007557 - CVE-2021-3807 nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes 2038898 - [UI] ?Update Repository? option not getting disabled after adding the Replication Repository details to the MTC web console 2040693 - ?Replication repository? wizard has no validation for name length 2040695 - [MTC UI] ?Add Cluster? wizard stucks when the cluster name length is more than 63 characters 2044591 - CVE-2022-0235 node-fetch: exposure of sensitive information to an unauthorized actor 2048537 - Exposed route host to image registry? connecting successfully to invalid registry ?xyz.com? 2053259 - CVE-2022-0536 follow-redirects: Exposure of Sensitive Information via Authorization Header leak 2055658 - [MTC UI] Cancel button on ?Migrations? page does not disappear when migration gets Failed/Succeeded with warnings 2056962 - [MTC UI] UI shows the wrong migration type info after changing the target namespace 2058172 - [MTC UI] Successful Rollback is not showing the green success icon in the ?Last State? field. 2058529 - [MTC UI] Migrations Plan is missing the type for the state migration performed before upgrade 2061335 - [MTC UI] ?Update cluster? button is not getting disabled 2062266 - MTC UI does not display logs properly [OADP-BL] 2062862 - [MTC UI] Clusters page behaving unexpectedly on deleting the remote cluster?s service account secret from backend 2074675 - HPAs of DeploymentConfigs are not being updated when migration from Openshift 3.x to Openshift 4.x 2076593 - Velero pod log missing from UI drop down 2076599 - Velero pod log missing from downloaded logs folder [OADP-BL] 2078459 - [MTC UI] Storageclass conversion plan is adding migstorage reference in migplan 2079252 - [MTC] Rsync options logs not visible in log-reader pod 2082221 - Don't allow Storage class conversion migration if source cluster has only one storage class defined [UI] 2082225 - non-numeric user when launching stage pods [OADP-BL] 2088022 - Default CPU requests on Velero/Restic are too demanding making scheduling fail in certain environments 2088026 - Cloud propagation phase in migration controller is not doing anything due to missing labels on Velero pods 2089126 - [MTC] Migration controller cannot find Velero Pod because of wrong labels 2089411 - [MTC] Log reader pod is missing velero and restic pod logs [OADP-BL] 2089859 - [Crane] DPA CR is missing the required flag - Migration is getting failed at the EnsureCloudSecretPropagated phase due to the missing secret VolumeMounts 2090317 - [MTC] mig-operator failed to create a DPA CR due to null values are passed instead of int [OADP-BL] 2096939 - Fix legacy operator.yml inconsistencies and errors 2100486 - [MTC UI] Target storage class field is not getting respected when clusters don't have replication repo configured. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-5095-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso March 09, 2022 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : linux CVE ID : CVE-2020-36310 CVE-2022-0001 CVE-2022-0002 CVE-2022-0487 CVE-2022-0492 CVE-2022-0617 CVE-2022-25636 Debian Bug : 990279 Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. CVE-2020-36310 A flaw was discovered in the KVM implementation for AMD processors, which could lead to an infinite loop. CVE-2022-0001 (INTEL-SA-00598) Researchers at VUSec discovered that the Branch History Buffer in Intel processors can be exploited to create information side- channels with speculative execution. This issue is similar to Spectre variant 2, but requires additional mitigations on some processors. This can be exploited to obtain sensitive information from a different security context, such as from user-space to the kernel, or from a KVM guest to the kernel. CVE-2022-0002 (INTEL-SA-00598) This is a similar issue to CVE-2022-0001, but covers exploitation within a security context, such as from JIT-compiled code in a sandbox to hosting code in the same process. This is partly mitigated by disabling eBPF for unprivileged users with the sysctl: kernel.unprivileged_bpf_disabled=2. This is already the default in Debian 11 "bullseye". CVE-2022-0487 A use-after-free was discovered in the MOXART SD/MMC Host Controller support driver. This flaw does not impact the Debian binary packages as CONFIG_MMC_MOXART is not set. A local user can take advantage of this flaw for privilege escalation and bypass of namespace isolation. CVE-2022-25636 Nick Gregory reported a heap out-of-bounds write flaw in the netfilter subsystem. For the stable distribution (bullseye), these problems have been fixed in version 5.10.103-1. This update additionally includes many more bug fixes from stable updates 5.10.93-5.10.103 inclusive. We recommend that you upgrade your linux packages. For the detailed security status of linux please refer to its security tracker page at: https://security-tracker.debian.org/tracker/linux Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmIotmRfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0Qajw//WLCg/HhmykP7eobsnnn7A0U0ONBbZi+Un6Ltueaambvlhme54l5eR4uh f8fLSehpKhEN4bzfWRnDe0vKbws557zsNnd+a000ylfkO6BqEoNL8VwMp0yOVvUt +nB39/ySIM1inH375JAWZ5M2+H8YJVBPrlm0kGxUtBwObC279atwGUINov4xrI5C RzcNa/FQ7tjUMaeBgdGAAJPImnP+zT6shhCUTlR5QLhvB9gyvthtb/OtvhbMcWlM 5gd7papoMFgWBspN21+NPmbadSEXDIpeyPanpfKu9S8Zmht69rTS+pEim6Hm682q 64m/Fb4NgCBgVUH9o8+QJUvJkHv8Z/lNDyfjSn90Eu7kcALDBqh/n+Y0q+SEwKhZ b6UPzuH+hObZk+7GDUY32t9JwlNu0qUk55nCufLVM01bVYkN5ukaXAWCyuCU83ky yY/nHRNHVISFuy6mdfiFRR7lvMcgBD0IPoU9T+cpZPl+WkwzEwyHx16RN/EDVlo6 NomcMiX07XRSwSG7h7wgFs+YxCv9TjvBoAqKS9Q7GwBX6lunItWMwz44+DxcW9SM lJPHFMju9hmqMBHI+UTUX8FMY9aq8Qyk+WFthl7eDZjOJ+lKtkEpTR3b50FXzbdc lTYZEMcNtr7AlThbIxH564DntN8YV3DCV4+Ba/DozvxSJ6kSmrA= =DHkG -----END PGP SIGNATURE----- . This update corrects flaws in the following subsystems: - ARM32 architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - Core kernel; - x86 architecture; - Block layer subsystem; - ACPI drivers; - Android drivers; - Power management core; - Bus devices; - Hardware random number generator core; - Clock framework and drivers; - CPU frequency scaling framework; - Cryptographic API; - Device frequency scaling framework; - DMA engine subsystem; - ARM SCMI message protocol; - EFI core; - GPU drivers; - HID subsystem; - Hardware monitoring drivers; - I2C subsystem; - IIO ADC drivers; - IIO subsystem; - IIO Magnetometer sensors drivers; - InfiniBand drivers; - IOMMU subsystem; - Multiple devices driver; - Media drivers; - MMC subsystem; - Network drivers; - NTB driver; - NVME drivers; - PCI subsystem; - PCI driver for MicroSemi Switchtec; - PHY drivers; - MediaTek PM domains; - Power supply drivers; - SCSI drivers; - SPI subsystem; - Media staging drivers; - TCM subsystem; - USB subsystem; - DesignWare USB3 driver; - Framebuffer layer; - AFS file system; - File systems infrastructure; - BTRFS file system; - Ceph distributed file system; - EROFS file system; - Ext4 file system; - F2FS file system; - JFS file system; - Network file system client; - NILFS2 file system; - NTFS3 file system; - Pstore file system; - Diskquota system; - SMB network file system; - BPF subsystem; - Memory management; - Netfilter; - TLS protocol; - io_uring subsystem; - Bluetooth subsystem; - Ethernet bridge; - CAN network layer; - Networking core; - HSR network protocol; - IPv4 networking; - IPv6 networking; - L2TP protocol; - Logical Link layer; - MAC80211 subsystem; - Multipath TCP; - Netlink; - NET/ROM layer; - NFC subsystem; - Packet sockets; - RDS protocol; - SMC sockets; - Sun RPC protocol; - TIPC protocol; - Unix domain sockets; - Wireless networking; - Tomoyo security module; - Realtek audio codecs; - USB sound devices; (CVE-2024-26910, CVE-2024-27074, CVE-2023-52494, CVE-2023-52594, CVE-2024-26915, CVE-2024-26766, CVE-2023-52489, CVE-2024-35845, CVE-2024-26846, CVE-2024-26898, CVE-2024-26897, CVE-2024-26826, CVE-2024-26798, CVE-2023-52662, CVE-2024-26856, CVE-2023-52608, CVE-2024-26782, CVE-2024-27047, CVE-2024-27390, CVE-2024-26610, CVE-2024-26804, CVE-2023-52638, CVE-2024-26771, CVE-2024-26752, CVE-2024-26585, CVE-2024-26645, CVE-2024-26715, CVE-2024-27028, CVE-2024-26809, CVE-2024-26880, CVE-2024-27432, CVE-2024-27065, CVE-2024-26717, CVE-2023-52616, CVE-2024-26748, CVE-2024-26795, CVE-2024-26671, CVE-2024-26743, CVE-2024-27412, CVE-2024-26802, CVE-2024-26733, CVE-2024-26736, CVE-2023-52618, CVE-2024-27046, CVE-2024-26688, CVE-2024-26679, CVE-2024-26769, CVE-2024-27051, CVE-2024-26603, CVE-2024-26744, CVE-2023-52434, CVE-2024-26697, CVE-2024-27075, CVE-2023-52583, CVE-2024-26583, CVE-2024-27403, CVE-2024-26907, CVE-2024-26636, CVE-2024-27410, CVE-2023-52530, CVE-2024-26840, CVE-2024-26851, CVE-2024-26862, CVE-2023-52640, CVE-2024-35829, CVE-2024-26906, CVE-2024-26777, CVE-2024-27419, CVE-2024-26664, CVE-2024-26627, CVE-2024-26859, CVE-2023-52486, CVE-2023-52652, CVE-2024-26835, CVE-2024-35844, CVE-2024-26702, CVE-2024-26635, CVE-2024-26704, CVE-2023-52633, CVE-2024-26816, CVE-2024-26894, CVE-2024-26778, CVE-2023-52599, CVE-2024-35828, CVE-2024-26776, CVE-2023-52493, CVE-2024-26845, CVE-2024-26594, CVE-2024-26885, CVE-2024-26829, CVE-2023-52645, CVE-2024-26695, CVE-2023-52615, CVE-2024-26651, CVE-2024-26843, CVE-2023-52606, CVE-2024-26675, CVE-2024-26874, CVE-2024-26883, CVE-2024-26772, CVE-2024-26673, CVE-2024-26737, CVE-2023-52631, CVE-2024-26640, CVE-2023-52598, CVE-2024-26735, CVE-2024-26895, CVE-2024-26592, CVE-2023-52492, CVE-2024-26861, CVE-2023-52644, CVE-2024-26920, CVE-2024-26877, CVE-2024-26863, CVE-2024-26720, CVE-2024-26722, CVE-2024-27045, CVE-2024-27038, CVE-2024-26763, CVE-2024-26833, CVE-2024-27417, CVE-2024-26916, CVE-2024-26857, CVE-2024-26875, CVE-2024-26606, CVE-2024-27024, CVE-2024-26615, CVE-2023-52614, CVE-2023-52641, CVE-2024-26600, CVE-2024-27043, CVE-2023-52635, CVE-2024-26787, CVE-2024-26622, CVE-2024-27413, CVE-2024-26791, CVE-2023-52622, CVE-2023-52491, CVE-2023-52604, CVE-2024-27037, CVE-2024-26881, CVE-2024-26754, CVE-2024-26659, CVE-2024-26663, CVE-2024-26747, CVE-2023-52602, CVE-2024-26712, CVE-2024-26839, CVE-2024-26749, CVE-2024-26764, CVE-2024-26820, CVE-2024-26882, CVE-2024-27039, CVE-2024-27078, CVE-2024-26889, CVE-2024-26870, CVE-2024-26788, CVE-2024-26602, CVE-2024-26903, CVE-2024-27044, CVE-2024-27073, CVE-2023-52601, CVE-2023-52595, CVE-2024-26707, CVE-2024-27415, CVE-2023-52637, CVE-2024-26660, CVE-2024-27414, CVE-2024-27054, CVE-2023-52497, CVE-2024-26801, CVE-2023-52435, CVE-2023-52620, CVE-2023-52627, CVE-2024-26698, CVE-2023-52597, CVE-2024-27077, CVE-2023-52650, CVE-2024-26750, CVE-2024-26852, CVE-2024-27053, CVE-2023-52656, CVE-2024-26625, CVE-2024-26779, CVE-2024-27431, CVE-2024-26751, CVE-2024-26684, CVE-2024-26803, CVE-2024-26593, CVE-2023-52642, CVE-2023-52447, CVE-2024-26790, CVE-2024-26825, CVE-2024-26668, CVE-2023-52607, CVE-2024-26872, CVE-2024-27030, CVE-2023-52643, CVE-2024-26901, CVE-2024-35830, CVE-2024-26855, CVE-2023-52588, CVE-2023-52587, CVE-2024-26891, CVE-2024-26644, CVE-2024-26884, CVE-2024-26793, CVE-2024-26805, CVE-2024-26584, CVE-2024-27405, CVE-2023-52623, CVE-2024-26608, CVE-2024-26878, CVE-2024-27388, CVE-2024-27416, CVE-2024-26685, CVE-2024-27034, CVE-2024-26879, CVE-2024-26614, CVE-2024-26792, CVE-2023-52617, CVE-2024-26773, CVE-2024-26665, CVE-2024-26641, CVE-2023-52619, CVE-2024-35811, CVE-2024-27052, CVE-2024-27076, CVE-2024-26838, CVE-2024-26808, CVE-2024-26696, CVE-2024-26676, CVE-2024-26689, CVE-2024-26774, CVE-2024-26601, CVE-2023-52498, CVE-2024-27436) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS linux-image-5.15.0-1058-intel-iotg 5.15.0-1058.64~20.04.1 linux-image-intel 5.15.0.1058.64~20.04.1 linux-image-intel-iotg 5.15.0.1058.64~20.04.1 After a standard system update you need to reboot your computer to make all the necessary changes. This update corrects flaws in the following subsystems: - Block layer subsystem; - Hardware random number generator core; - Memory management; - Netfilter; (CVE-2024-26898, CVE-2023-52615, CVE-2024-26642, CVE-2024-26720) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 LTS linux-image-4.4.0-1134-kvm 4.4.0-1134.144 Available with Ubuntu Pro linux-image-4.4.0-1171-aws 4.4.0-1171.186 Available with Ubuntu Pro linux-image-4.4.0-256-generic 4.4.0-256.290 Available with Ubuntu Pro linux-image-4.4.0-256-lowlatency 4.4.0-256.290 Available with Ubuntu Pro linux-image-aws 4.4.0.1171.175 Available with Ubuntu Pro linux-image-generic 4.4.0.256.262 Available with Ubuntu Pro linux-image-generic-lts-xenial 4.4.0.256.262 Available with Ubuntu Pro linux-image-kvm 4.4.0.1134.131 Available with Ubuntu Pro linux-image-lowlatency 4.4.0.256.262 Available with Ubuntu Pro linux-image-lowlatency-lts-xenial 4.4.0.256.262 Available with Ubuntu Pro linux-image-virtual 4.4.0.256.262 Available with Ubuntu Pro linux-image-virtual-lts-xenial 4.4.0.256.262 Available with Ubuntu Pro Ubuntu 14.04 LTS linux-image-4.4.0-1133-aws 4.4.0-1133.139 Available with Ubuntu Pro linux-image-4.4.0-256-generic 4.4.0-256.290~14.04.1 Available with Ubuntu Pro linux-image-4.4.0-256-lowlatency 4.4.0-256.290~14.04.1 Available with Ubuntu Pro linux-image-aws 4.4.0.1133.130 Available with Ubuntu Pro linux-image-generic-lts-xenial 4.4.0.256.290~14.04.1 Available with Ubuntu Pro linux-image-lowlatency-lts-xenial 4.4.0.256.290~14.04.1 Available with Ubuntu Pro linux-image-virtual-lts-xenial 4.4.0.256.290~14.04.1 Available with Ubuntu Pro After a standard system update you need to reboot your computer to make all the necessary changes

Trust: 2.07

sources: NVD: CVE-2022-0001 // VULHUB: VHN-404550 // VULMON: CVE-2022-0001 // PACKETSTORM: 166569 // PACKETSTORM: 166241 // PACKETSTORM: 167602 // PACKETSTORM: 167622 // PACKETSTORM: 167330 // PACKETSTORM: 167679 // PACKETSTORM: 169340 // PACKETSTORM: 178635 // PACKETSTORM: 179061 // PACKETSTORM: 179347 // PACKETSTORM: 179346

AFFECTED PRODUCTS

vendor:intelmodel:xeon gold 6240rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2356gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-11390hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n4020scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6238tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10710uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1030g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-11600scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g5205uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2286mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-1115g4escope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silver 4310tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6222vscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8310yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1035g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-11600tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6346scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-12700hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6342scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silver 4214yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-l13g4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron j4025scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2386gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5215lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6230rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6326scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-10885mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5318sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom x6200fescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1370scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-1160g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-12900kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9400hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1270scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n6211scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-2245scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-12650hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-3245mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1390pscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-12900hkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n4100scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-2255scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10700scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-11260hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1140g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-10900escope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n4504scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-12300tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-10900tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silver 4215rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-l16g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10400tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-7940xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6209uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-11850hescope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 5305uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 9221scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6258rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1035g4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-1260pscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6248rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silver 4215scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10500tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium silver n6000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6248scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom x6427fescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1145g7escope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6212uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-1280pscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-12900kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-12700kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-11155mrescope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n4120scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom x6425escope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5218nscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron j4105scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-9960xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-10105tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9300hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8362scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8360hlscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10300hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-11900fscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-10305tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1290scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6252nscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-1185g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silver 4309yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-10855mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-12100tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-10900kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6336yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-9700kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-2223scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5222scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silver 4316scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-1060g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10600tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10870hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7800xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silver 4214scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold g6600scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1250pscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6252scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1270pscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-10305scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10700fscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium silver n5030scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-11400fscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8360yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1250pscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron j4005scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8260yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6262vscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g5920scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-11700fscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5218scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1390scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-3245scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n4500scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10810uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-12700tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-10100tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1135g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-12900tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6230tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold g6405uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6238scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6250scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6330hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6230scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-11155mlescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-1185g7escope:eqversion: -

Trust: 1.0

vendor:oraclemodel:communications cloud native core policyscope:eqversion:22.2.0

Trust: 1.0

vendor:intelmodel:core i5-10500scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-7960xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n5105scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom p5942bscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2288gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8360hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-1185grescope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n5100scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-9900xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1290escope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d1700scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-11500scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom x6413escope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2324gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5218bscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1370pscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-1065g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-3275scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silver 4214rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g5905tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10600kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6328hlscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-12700fscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8280lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-12450hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-3225scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1390tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5318hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8268scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-10100tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-1125g4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8365uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10850hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8276lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1290tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-9820xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-11400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10210uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10400hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6246rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6242scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-9940xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-1180g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-10100fscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold g6400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6246scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silver 4210rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5217scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10510yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium silver n6005scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m3-8100yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n4000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silver 4216scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10700escope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g5900scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6230nscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 9242scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-10300scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-10900tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1290tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6242rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-9750hfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-11100hescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-12400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-11300hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6348scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-1220pscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silver 4310scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-10850kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-10110uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-11865mldscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9400fscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10505scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6238rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10510uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10700kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-10320scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-11950hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-12400tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-12600hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-11500tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom p5931bscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-12600tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7640xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5218tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6354scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 9282scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1035g1scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5220tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon bronze 3204scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold g6505tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold g6500tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1145grescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-11400tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10610uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold g6505scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2374gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6250lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-11700tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6338tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1145g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold g6405tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-11900tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-10885hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8380scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8260scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-11850hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-12400fscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-1165g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-1115grescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-9900kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6234scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10400fscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8500yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8276scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 6600hescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silver 4314scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10700kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2314scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8376hlscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5318nscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium silver j5005scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom x6211escope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium silver j5040scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8358pscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-11865mrescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-10920xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silver 4210tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2278gescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6226rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom x6212rescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8665uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-12700kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom x6425rescope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron j6413scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold g6400tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom p5921bscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8253scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6330nscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6338scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8352vscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-9700kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-12900fscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-9980hkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon bronze 3206rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1130g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-11600kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6338nscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6348hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-10100scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-2235scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-11980hkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold g7400tscope:eqversion: -

Trust: 1.0

vendor:oraclemodel:communications cloud native core binding support functionscope:eqversion:22.1.3

Trust: 1.0

vendor:intelmodel:core i5-11320hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-11555mlescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-12100fscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-12500scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8352yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-9850hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10110yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-11600kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6240scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-10855scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-10940xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2278gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-12900hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silver 4208scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-9800xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6256scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 6305escope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5318yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-11500hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6254scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10500tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5317scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-1270pscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron j4125scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g6900scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-12100scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-12600scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8352sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g5900tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8256scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-7920xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold g6605scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-11700scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-12700scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7820xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2278gelscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-11855mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-12300scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g6900tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8354hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5315yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-12500tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6226scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-11400hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8280scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-10325scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-11700kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2336scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6208uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-9900kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-1000g4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold g6405scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-11955mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10875hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-12800hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-1120g4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-11370hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-12900scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold g7400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6328hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium n6415scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold g6500scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-3275mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10750hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8353hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10210yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-1110g4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6238lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g5305uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8380hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10600kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2378scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-11375hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-11700kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-11800hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold 7505scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2334scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8352mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-1005g1scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium silver n5000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8265uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1350scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1030g4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8358scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-1195g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1290pscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-10105scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-10900scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-11555mrescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6330scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1300scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8351nscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-11900kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5215scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8368scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-9920xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10600scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-1115g4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-2265scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8270scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-10980hkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7740xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10700tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8376hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-10850hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8200yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5220rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2388gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1155g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6244scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 9222scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5220scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-11900hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5320scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6240lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silver 4210scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silver 4209tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10310yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8380hlscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-2225scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10700tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1350pscope:eqversion: -

Trust: 1.0

vendor:oraclemodel:communications cloud native core network exposure functionscope:eqversion:22.1.1

Trust: 1.0

vendor:intelmodel:xeon gold 5220sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d2700scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-3235scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-3265scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9600kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-12500hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom p5962bscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5320hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-10300tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-12600kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-11900kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-9880hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5218rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-11900scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10200hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-10900xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6334scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-3265mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium j6425scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8210yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-10105fscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6314uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2378gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8260lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8368qscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-12600kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8565uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6210uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-7900xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1240pscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6240yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6312uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8356hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-1250scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 6305scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g5905scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-1000g1scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-2275scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5320tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9600kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g5925scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-3223scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-2295scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-10900kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-10900fscope:eqversion: -

Trust: 1.0

sources: NVD: CVE-2022-0001

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-0001
value: MEDIUM

Trust: 1.0

VULHUB: VHN-404550
value: LOW

Trust: 0.1

VULMON: CVE-2022-0001
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2022-0001
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

VULHUB: VHN-404550
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2022-0001
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.0
impactScore: 4.0
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-404550 // VULMON: CVE-2022-0001 // NVD: CVE-2022-0001

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2022-0001

THREAT TYPE

local

Trust: 0.3

sources: PACKETSTORM: 166569 // PACKETSTORM: 166241 // PACKETSTORM: 178635

TYPE

arbitrary

Trust: 0.5

sources: PACKETSTORM: 166569 // PACKETSTORM: 166241 // PACKETSTORM: 179061 // PACKETSTORM: 179347 // PACKETSTORM: 179346

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-404550

PATCH

title:Red Hat: url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2022-0001

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2022-0001

Trust: 0.1

title:Ubuntu Security Notice: USN-5318-1: Linux kernel vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-5318-1

Trust: 0.1

title:Ubuntu Security Notice: USN-5317-1: Linux kernel vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-5317-1

Trust: 0.1

title:Debian Security Advisories: DSA-5095-1 linux -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=145808a324d7a624b8cc14cfceaae987

Trust: 0.1

title:Amazon Linux 2: ALAS2KERNEL-5.4-2022-023url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2KERNEL-5.4-2022-023

Trust: 0.1

title:Amazon Linux 2: ALAS2KERNEL-5.10-2022-011url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2KERNEL-5.10-2022-011

Trust: 0.1

title:Ubuntu Security Notice: USN-5362-1: Linux kernel (Intel IOTG) vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-5362-1

Trust: 0.1

title:Amazon Linux AMI: ALAS-2022-1571url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2022-1571

Trust: 0.1

title:Amazon Linux 2022: ALAS2022-2022-039url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2022&qid=ALAS2022-2022-039

Trust: 0.1

title:Red Hat: Important: kernel security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221988 - Security Advisory

Trust: 0.1

title:Amazon Linux 2: ALAS2-2022-1761url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2022-1761

Trust: 0.1

title:Red Hat: Moderate: Migration Toolkit for Containers (MTC) 1.6.5 security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20224814 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: Migration Toolkit for Containers (MTC) 1.7.2 security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20225483 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat Advanced Cluster Management 2.5 security updates, images, and bug fixesurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20224956 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: Red Hat Advanced Cluster Management 2.4.5 security updates and bug fixesurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20225201 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: Red Hat Advanced Cluster Management 2.3.11 security updates and bug fixesurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20225392 - Security Advisory

Trust: 0.1

title:Debian Security Advisories: DSA-5096-1 linux -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=9382520336267e8dcd400d9d993e932b

Trust: 0.1

title: - url:https://github.com/Live-Hack-CVE/CVE-2022-0001

Trust: 0.1

title: - url:https://github.com/dadav/scf

Trust: 0.1

title: - url:https://github.com/Tsuki124/crawlab-sdk

Trust: 0.1

title: - url:https://github.com/Tsuki124/crawlab-db

Trust: 0.1

title: - url:https://github.com/turbot/steampipe-plugin-trivy

Trust: 0.1

title: - url:https://github.com/vincent-deng/veracode-container-security-finding-parser

Trust: 0.1

title:The Registerurl:https://www.theregister.co.uk/2022/03/15/spectre_bti_intel_amd_arm/

Trust: 0.1

title:The Registerurl:https://www.theregister.co.uk/2022/03/09/microsoft_patch_tuesday/

Trust: 0.1

sources: VULMON: CVE-2022-0001

EXTERNAL IDS

db:NVDid:CVE-2022-0001

Trust: 2.3

db:OPENWALLid:OSS-SECURITY/2022/03/18/2

Trust: 1.2

db:CERT/CCid:VU#155143

Trust: 1.0

db:PACKETSTORMid:166569

Trust: 0.2

db:PACKETSTORMid:166241

Trust: 0.2

db:PACKETSTORMid:166248

Trust: 0.1

db:PACKETSTORMid:166243

Trust: 0.1

db:VULHUBid:VHN-404550

Trust: 0.1

db:VULMONid:CVE-2022-0001

Trust: 0.1

db:PACKETSTORMid:167602

Trust: 0.1

db:PACKETSTORMid:167622

Trust: 0.1

db:PACKETSTORMid:167330

Trust: 0.1

db:PACKETSTORMid:167679

Trust: 0.1

db:PACKETSTORMid:169340

Trust: 0.1

db:PACKETSTORMid:178635

Trust: 0.1

db:PACKETSTORMid:179061

Trust: 0.1

db:PACKETSTORMid:179347

Trust: 0.1

db:PACKETSTORMid:179346

Trust: 0.1

sources: VULHUB: VHN-404550 // VULMON: CVE-2022-0001 // PACKETSTORM: 166569 // PACKETSTORM: 166241 // PACKETSTORM: 167602 // PACKETSTORM: 167622 // PACKETSTORM: 167330 // PACKETSTORM: 167679 // PACKETSTORM: 169340 // PACKETSTORM: 178635 // PACKETSTORM: 179061 // PACKETSTORM: 179347 // PACKETSTORM: 179346 // NVD: CVE-2022-0001

REFERENCES

url:https://security.netapp.com/advisory/ntap-20220818-0004/

Trust: 1.2

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html

Trust: 1.2

url:https://www.oracle.com/security-alerts/cpujul2022.html

Trust: 1.2

url:http://www.openwall.com/lists/oss-security/2022/03/18/2

Trust: 1.2

url:https://www.kb.cert.org/vuls/id/155143

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2022-0001

Trust: 0.7

url:https://access.redhat.com/security/cve/cve-2022-0001

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2021-3752

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-4157

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-3744

Trust: 0.4

url:https://access.redhat.com/security/team/contact/

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-13974

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-41617

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-45485

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-3773

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-4002

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-29154

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-43976

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-0941

Trust: 0.4

url:https://bugzilla.redhat.com/):

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-43389

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-3634

Trust: 0.4

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-27820

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-4189

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-44733

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2022-1271

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-21781

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-3634

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-4037

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-29154

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-37159

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-4788

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-3772

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-0404

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-3669

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-3764

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-20322

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-43056

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-3612

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-41864

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-4197

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2018-25032

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-0941

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-3612

Trust: 0.4

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-26401

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-27820

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-3743

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-3737

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2022-1011

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-13974

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-20322

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-4083

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-45486

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2022-0322

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-4788

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-26401

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2022-0286

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-3759

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-21781

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2022-0002

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-4203

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2018-25032

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-42739

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-0404

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2022-25636

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-19131

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-19131

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-0847

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-23960

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-0492

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-0002

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3696

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-38185

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-28733

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-21803

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-29526

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-28736

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3697

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-28734

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-25219

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-28737

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-25219

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3695

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-28735

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-24785

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-23806

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-29810

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-3669

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-0235

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-0536

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-1154

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-35492

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-35492

Trust: 0.2

url:https://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3807

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2023-52493

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2023-52583

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2023-52601

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2023-52492

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2024-23307

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2024-26898

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2023-6270

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-33631

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2024-24861

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2024-2201

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/live-hack-cve/cve-2022-0001

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5318-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0330

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0435

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4083

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0516

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0742

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-22942

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5362-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-intel-5.13/5.13.0-1010.10

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4155

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0185

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-42327

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4090

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-23222

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle-5.13/5.13.0-1021.26~20.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/5.13.0-1017.19

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe-5.13/5.13.0-35.40~20.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/5.13.0-1017.19

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/5.13.0-35.40

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure-5.13/5.13.0-1017.19~20.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp-5.13/5.13.0-1019.23~20.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi/5.13.0-1020.22

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws-5.13/5.13.0-1017.19~20.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/5.13.0-1019.23

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5317-1

Trust: 0.1

url:https://wiki.ubuntu.com/securityteam/knowledgebase/bhi

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/5.13.0-1021.26

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oem-5.14/5.14.0-1027.30

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/5.13.0-1016.17

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-25645

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-43565

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html-single/install/index#installing

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:5201

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-24450

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1708

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.3/html-single/install/index#installing

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.3/html/release_notes/

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-0492

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:5392

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.3/html/release_notes/index

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:4814

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3752

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-39293

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3772

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3773

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3743

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3764

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-37159

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3737

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3759

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-39293

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4002

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3744

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3807

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-26691

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:5483

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-23852

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0487

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-36310

Trust: 0.1

url:https://security-tracker.debian.org/tracker/linux

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0617

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws-5.15/5.15.0-1061.67~20.04.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-52617

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-52616

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-52595

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-52597

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-6766-3

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-52587

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/5.15.0-1061.67

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-52607

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-52606

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-52615

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-52435

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-6766-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-47233

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-52588

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-6828-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-52530

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-52486

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-52594

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-52598

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-52599

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-52497

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-52491

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-intel-iotg-5.15/5.15.0-1058.64~20.04.1

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-6866-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2024-26720

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-47063

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-6865-1

Trust: 0.1

sources: VULHUB: VHN-404550 // VULMON: CVE-2022-0001 // PACKETSTORM: 166569 // PACKETSTORM: 166241 // PACKETSTORM: 167602 // PACKETSTORM: 167622 // PACKETSTORM: 167330 // PACKETSTORM: 167679 // PACKETSTORM: 169340 // PACKETSTORM: 178635 // PACKETSTORM: 179061 // PACKETSTORM: 179347 // PACKETSTORM: 179346 // NVD: CVE-2022-0001

CREDITS

Ubuntu

Trust: 0.6

sources: PACKETSTORM: 166569 // PACKETSTORM: 166241 // PACKETSTORM: 178635 // PACKETSTORM: 179061 // PACKETSTORM: 179347 // PACKETSTORM: 179346

SOURCES

db:VULHUBid:VHN-404550
db:VULMONid:CVE-2022-0001
db:PACKETSTORMid:166569
db:PACKETSTORMid:166241
db:PACKETSTORMid:167602
db:PACKETSTORMid:167622
db:PACKETSTORMid:167330
db:PACKETSTORMid:167679
db:PACKETSTORMid:169340
db:PACKETSTORMid:178635
db:PACKETSTORMid:179061
db:PACKETSTORMid:179347
db:PACKETSTORMid:179346
db:NVDid:CVE-2022-0001

LAST UPDATE DATE

2024-11-23T20:50:11.643000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-404550date:2022-08-19T00:00:00
db:VULMONid:CVE-2022-0001date:2022-08-19T00:00:00
db:NVDid:CVE-2022-0001date:2024-11-21T06:37:45.587

SOURCES RELEASE DATE

db:VULHUBid:VHN-404550date:2022-03-11T00:00:00
db:VULMONid:CVE-2022-0001date:2022-03-11T00:00:00
db:PACKETSTORMid:166569date:2022-04-01T15:43:44
db:PACKETSTORMid:166241date:2022-03-09T15:15:52
db:PACKETSTORMid:167602date:2022-06-28T15:20:26
db:PACKETSTORMid:167622date:2022-06-29T20:27:02
db:PACKETSTORMid:167330date:2022-05-31T17:24:53
db:PACKETSTORMid:167679date:2022-07-01T15:04:32
db:PACKETSTORMid:169340date:2022-03-28T19:12:00
db:PACKETSTORMid:178635date:2024-05-20T14:28:20
db:PACKETSTORMid:179061date:2024-06-12T13:56:01
db:PACKETSTORMid:179347date:2024-07-04T15:01:00
db:PACKETSTORMid:179346date:2024-07-04T15:00:48
db:NVDid:CVE-2022-0001date:2022-03-11T18:15:25.143