ID

VAR-202206-1186


CVE

CVE-2022-21125


TITLE

Microsoft Windows Information disclosure vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-202206-1339

DESCRIPTION

Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. Microsoft Windows是美国微软(Microsoft)公司的一套个人设备使用的操作系统. Microsoft Windows存在安全漏洞。该漏洞源于Intel处理器存在安全问题。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows 10 Version 1809 for ARM64-based Systems,Windows Server 2019,Windows Server 2019 (Server Core installation),Windows 10 Version 21H1 for x64-based Systems,Windows 10 Version 21H1 for ARM64-based Systems,Windows 10 Version 21H1 for 32-bit Systems,Windows Server 2022,Windows Server 2022 (Server Core installation),Windows 10 Version 20H2 for x64-based Systems,Windows 10 Version 20H2 for 32-bit Systems,Windows 10 Version 20H2 for ARM64-based Systems,Windows Server, version 20H2 (Server Core Installation),Windows 11 for x64-based Systems,Windows 11 for ARM64-based Systems,Windows 10 Version 21H2 for 32-bit Systems,Windows 10 Version 21H2 for ARM64-based Systems,Windows 10 Version 21H2 for x64-based Systems,Windows 10 for 32-bit Systems,Windows 10 for x64-based Systems,Windows 10 Version 1607 for 32-bit Systems,Windows 10 Version 1607 for x64-based Systems,Windows Server 2016,Windows Server 2016 (Server Core installation),Windows 7 for 32-bit Systems Service Pack 1,Windows 7 for x64-based Systems Service Pack 1,Windows 8.1 for 32-bit systems,Windows 8.1 for x64-based systems,Windows RT 8.1,Windows Server 2008 for 32-bit Systems Service Pack 2,Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation),Windows Server 2008 for x64-based Systems Service Pack 2,Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation),Windows Server 2008 R2 for x64-based Systems Service Pack 1,Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation),Windows Server 2012,Windows Server 2012 (Server Core installation),Windows Server 2012 R2,Windows Server 2012 R2 (Server Core installation). Bugs fixed (https://bugzilla.redhat.com/): 2045880 - CVE-2022-21698 prometheus/client_golang: Denial of service using InstrumentHandlerCounter 2100495 - CVE-2021-38561 golang: out-of-bounds read in golang.org/x/text/language leads to DoS 5. The following packages have been upgraded to a later upstream version: kernel (4.18.0). Bug Fix(es): * DR, Ignore modify TTL if ConnectX-5 doesn't support it (BZ#2075549) * execve exit tracepoint not called (BZ#2106663) * Unable to boot RHEL-8.6 on Brazos max. (BZ#2107490) * soft lockups under heavy I/O load to ahci connected SSDs (BZ#2110773) * Allow substituting custom vmlinux.h for the build (BZ#2116407) 4. ========================================================================= Ubuntu Security Notice USN-5529-1 July 21, 2022 linux-oem-5.17 vulnerabilities ========================================================================= A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-oem-5.17: Linux kernel for OEM systems Details: It was discovered that the Atheros ath9k wireless device driver in the Linux kernel did not properly handle some error conditions, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1679) Yongkang Jia discovered that the KVM hypervisor implementation in the Linux kernel did not properly handle guest TLB mapping invalidation requests in some situations. An attacker in a guest VM could use this to cause a denial of service (system crash) in the host OS. (CVE-2022-1789) Qiuhao Li, Gaoning Pan, and Yongkang Jia discovered that the KVM hypervisor implementation in the Linux kernel did not properly handle an illegal instruction in a guest, resulting in a null pointer dereference. An attacker in a guest VM could use this to cause a denial of service (system crash) in the host OS. (CVE-2022-1852) Gerald Lee discovered that the NTFS file system implementation in the Linux kernel did not properly handle certain error conditions, leading to a use- after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2022-1973) It was discovered that the netfilter subsystem in the Linux kernel contained a buffer overflow in certain situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-2078) It was discovered that some Intel processors did not completely perform cleanup actions on multi-core shared buffers. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21123) It was discovered that some Intel processors did not completely perform cleanup actions on microarchitectural fill buffers. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21125) It was discovered that some Intel processors did not properly perform cleanup during specific special register write operations. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21166) It was discovered that the virtio RPMSG bus driver in the Linux kernel contained a double-free vulnerability in certain error conditions. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-34494, CVE-2022-34495) Minh Yuan discovered that the floppy disk driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-1652) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 LTS: linux-image-5.17.0-1013-oem 5.17.0-1013.14 linux-image-oem-22.04 5.17.0.1013.12 linux-image-oem-22.04a 5.17.0.1013.12 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5529-1 CVE-2022-1652, CVE-2022-1679, CVE-2022-1789, CVE-2022-1852, CVE-2022-1973, CVE-2022-2078, CVE-2022-21123, CVE-2022-21125, CVE-2022-21166, CVE-2022-34494, CVE-2022-34495 Package Information: https://launchpad.net/ubuntu/+source/linux-oem-5.17/5.17.0-1013.14 . Bugs fixed (https://bugzilla.redhat.com/): 1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation 2024946 - Ingress Canary does not respect router sharding on default IngressController 2104825 - Installer creates unnecessary master_ingress_cluster_policy_controller security group rule 2108214 - Route status isn't always getting cleared with routeSelector updates 2108595 - etcd Dashboard should be removed on guest cluster of hypershift 2109193 - Power VS machine Processor is always defaulted to 0.5 2109887 - [UI] MultiClusterHub details after it's creation starts flickers, disappears and appears back (happened twice) 2110528 - Route status isn't always getting cleared with routeSelector updates 2111345 - should use the same value for AlertRelabelConfig with oc explain 2117424 - Backport: https://github.com/openshift/kubernetes/pull/1295 5. JIRA issues fixed (https://issues.jboss.org/): OCPBUGS-1007 - CVE-2021-3121 telemeter-container: [1924548] telemeter-container: gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation [openshift-4] OCPBUGS-1070 - Update ODC owners OCPBUGS-1104 - package-server-manager does not migrate packageserver CSV from v0.17.0 to v0.18.3 on OCP 4.8 -> 4.9 upgrade OCPBUGS-1145 - Bug 2085336 - [IPI-Azure] Fail to create the worker node which HyperVGenerations is V2 or V1 and vmNetworkingType is Accelerated OCPBUGS-1233 - [IPI] nodelink controller is not able to reconcile and match nodes and machines with logical interfaces defined by nmstate at baremetalhost creation OCPBUGS-1261 - Backport: https://github.com/openshift/kubernetes/pull/1295 OCPBUGS-393 - Setting disableNetworkDiagnostics: true does not persist when network-operator pod gets re-created OCPBUGS-455 - [vsphere] update install-config description for diskType OCPBUGS-524 - Plugin page error boundary message is not cleared after leaving page OCPBUGS-668 - Prefer local dns does not work expectedly on OCPv4.11 OCPBUGS-744 - [4.11] Spoke BMH stuck ?provisioning? after changing a BIOS attribute via the converged workflow OCPBUGS-746 - [4.11] Supermicro server FirmwareSchema CR does not contain allowable_values, attribute_type and read_only flag OCPBUGS-747 - [4.11] Disconnected IPI OCP cluster install on baremetal fails when hostname of master nodes does not include the text "master 6. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2022:7279-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2022:7279 Issue date: 2022-11-01 CVE Names: CVE-2022-2588 CVE-2022-21123 CVE-2022-21125 CVE-2022-21166 ==================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux BaseOS AUS (v. 8.2) - aarch64, noarch, ppc64le, s390x, x86_64 Red Hat Enterprise Linux BaseOS E4S (v. 8.2) - aarch64, noarch, ppc64le, s390x, x86_64 Red Hat Enterprise Linux BaseOS TUS (v. 8.2) - aarch64, noarch, ppc64le, s390x, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation (CVE-2022-2588) * hw: cpu: Incomplete cleanup of multi-core shared buffers (aka SBDR) (CVE-2022-21123) * hw: cpu: Incomplete cleanup of microarchitectural fill buffers (aka SBDS) (CVE-2022-21125) * hw: cpu: Incomplete cleanup in specific special register write operations (aka DRPW) (CVE-2022-21166) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * RHEL8.6[64TB/240c Denali]:" vmcore failed, _exitcode:139" error observed while capturing vmcore during fadump after memory remove. incomplete vmcore is captured. (BZ#2107491) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 2090237 - CVE-2022-21123 hw: cpu: Incomplete cleanup of multi-core shared buffers (aka SBDR) 2090240 - CVE-2022-21125 hw: cpu: Incomplete cleanup of microarchitectural fill buffers (aka SBDS) 2090241 - CVE-2022-21166 hw: cpu: Incomplete cleanup in specific special register write operations (aka DRPW) 2114849 - CVE-2022-2588 kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation 6. Package List: Red Hat Enterprise Linux BaseOS AUS (v. 8.2): Source: kernel-4.18.0-193.93.1.el8_2.src.rpm aarch64: bpftool-4.18.0-193.93.1.el8_2.aarch64.rpm bpftool-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-core-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-cross-headers-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debug-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debug-core-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debug-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debug-devel-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debug-modules-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debug-modules-extra-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debuginfo-common-aarch64-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-devel-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-headers-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-modules-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-modules-extra-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-tools-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-tools-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-tools-libs-4.18.0-193.93.1.el8_2.aarch64.rpm perf-4.18.0-193.93.1.el8_2.aarch64.rpm perf-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm python3-perf-4.18.0-193.93.1.el8_2.aarch64.rpm python3-perf-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm noarch: kernel-abi-whitelists-4.18.0-193.93.1.el8_2.noarch.rpm kernel-doc-4.18.0-193.93.1.el8_2.noarch.rpm ppc64le: bpftool-4.18.0-193.93.1.el8_2.ppc64le.rpm bpftool-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-core-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-cross-headers-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debug-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debug-core-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debug-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debug-devel-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debug-modules-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debug-modules-extra-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-devel-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-headers-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-modules-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-modules-extra-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-tools-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-tools-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-tools-libs-4.18.0-193.93.1.el8_2.ppc64le.rpm perf-4.18.0-193.93.1.el8_2.ppc64le.rpm perf-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm python3-perf-4.18.0-193.93.1.el8_2.ppc64le.rpm python3-perf-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm s390x: bpftool-4.18.0-193.93.1.el8_2.s390x.rpm bpftool-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm kernel-4.18.0-193.93.1.el8_2.s390x.rpm kernel-core-4.18.0-193.93.1.el8_2.s390x.rpm kernel-cross-headers-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debug-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debug-core-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debug-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debug-devel-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debug-modules-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debug-modules-extra-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debuginfo-common-s390x-4.18.0-193.93.1.el8_2.s390x.rpm kernel-devel-4.18.0-193.93.1.el8_2.s390x.rpm kernel-headers-4.18.0-193.93.1.el8_2.s390x.rpm kernel-modules-4.18.0-193.93.1.el8_2.s390x.rpm kernel-modules-extra-4.18.0-193.93.1.el8_2.s390x.rpm kernel-tools-4.18.0-193.93.1.el8_2.s390x.rpm kernel-tools-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm kernel-zfcpdump-4.18.0-193.93.1.el8_2.s390x.rpm kernel-zfcpdump-core-4.18.0-193.93.1.el8_2.s390x.rpm kernel-zfcpdump-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm kernel-zfcpdump-devel-4.18.0-193.93.1.el8_2.s390x.rpm kernel-zfcpdump-modules-4.18.0-193.93.1.el8_2.s390x.rpm kernel-zfcpdump-modules-extra-4.18.0-193.93.1.el8_2.s390x.rpm perf-4.18.0-193.93.1.el8_2.s390x.rpm perf-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm python3-perf-4.18.0-193.93.1.el8_2.s390x.rpm python3-perf-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm x86_64: bpftool-4.18.0-193.93.1.el8_2.x86_64.rpm bpftool-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-core-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-cross-headers-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debug-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debug-core-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debug-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debug-devel-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debug-modules-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debug-modules-extra-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debuginfo-common-x86_64-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-devel-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-headers-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-modules-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-modules-extra-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-tools-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-tools-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-tools-libs-4.18.0-193.93.1.el8_2.x86_64.rpm perf-4.18.0-193.93.1.el8_2.x86_64.rpm perf-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm python3-perf-4.18.0-193.93.1.el8_2.x86_64.rpm python3-perf-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm Red Hat Enterprise Linux BaseOS E4S (v. 8.2): Source: kernel-4.18.0-193.93.1.el8_2.src.rpm aarch64: bpftool-4.18.0-193.93.1.el8_2.aarch64.rpm bpftool-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-core-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-cross-headers-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debug-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debug-core-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debug-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debug-devel-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debug-modules-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debug-modules-extra-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debuginfo-common-aarch64-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-devel-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-headers-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-modules-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-modules-extra-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-tools-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-tools-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-tools-libs-4.18.0-193.93.1.el8_2.aarch64.rpm perf-4.18.0-193.93.1.el8_2.aarch64.rpm perf-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm python3-perf-4.18.0-193.93.1.el8_2.aarch64.rpm python3-perf-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm noarch: kernel-abi-whitelists-4.18.0-193.93.1.el8_2.noarch.rpm kernel-doc-4.18.0-193.93.1.el8_2.noarch.rpm ppc64le: bpftool-4.18.0-193.93.1.el8_2.ppc64le.rpm bpftool-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-core-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-cross-headers-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debug-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debug-core-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debug-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debug-devel-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debug-modules-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debug-modules-extra-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-devel-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-headers-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-modules-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-modules-extra-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-tools-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-tools-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-tools-libs-4.18.0-193.93.1.el8_2.ppc64le.rpm perf-4.18.0-193.93.1.el8_2.ppc64le.rpm perf-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm python3-perf-4.18.0-193.93.1.el8_2.ppc64le.rpm python3-perf-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm s390x: bpftool-4.18.0-193.93.1.el8_2.s390x.rpm bpftool-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm kernel-4.18.0-193.93.1.el8_2.s390x.rpm kernel-core-4.18.0-193.93.1.el8_2.s390x.rpm kernel-cross-headers-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debug-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debug-core-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debug-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debug-devel-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debug-modules-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debug-modules-extra-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debuginfo-common-s390x-4.18.0-193.93.1.el8_2.s390x.rpm kernel-devel-4.18.0-193.93.1.el8_2.s390x.rpm kernel-headers-4.18.0-193.93.1.el8_2.s390x.rpm kernel-modules-4.18.0-193.93.1.el8_2.s390x.rpm kernel-modules-extra-4.18.0-193.93.1.el8_2.s390x.rpm kernel-tools-4.18.0-193.93.1.el8_2.s390x.rpm kernel-tools-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm kernel-zfcpdump-4.18.0-193.93.1.el8_2.s390x.rpm kernel-zfcpdump-core-4.18.0-193.93.1.el8_2.s390x.rpm kernel-zfcpdump-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm kernel-zfcpdump-devel-4.18.0-193.93.1.el8_2.s390x.rpm kernel-zfcpdump-modules-4.18.0-193.93.1.el8_2.s390x.rpm kernel-zfcpdump-modules-extra-4.18.0-193.93.1.el8_2.s390x.rpm perf-4.18.0-193.93.1.el8_2.s390x.rpm perf-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm python3-perf-4.18.0-193.93.1.el8_2.s390x.rpm python3-perf-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm x86_64: bpftool-4.18.0-193.93.1.el8_2.x86_64.rpm bpftool-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-core-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-cross-headers-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debug-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debug-core-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debug-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debug-devel-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debug-modules-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debug-modules-extra-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debuginfo-common-x86_64-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-devel-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-headers-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-modules-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-modules-extra-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-tools-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-tools-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-tools-libs-4.18.0-193.93.1.el8_2.x86_64.rpm perf-4.18.0-193.93.1.el8_2.x86_64.rpm perf-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm python3-perf-4.18.0-193.93.1.el8_2.x86_64.rpm python3-perf-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm Red Hat Enterprise Linux BaseOS TUS (v. 8.2): Source: kernel-4.18.0-193.93.1.el8_2.src.rpm aarch64: bpftool-4.18.0-193.93.1.el8_2.aarch64.rpm bpftool-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-core-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-cross-headers-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debug-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debug-core-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debug-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debug-devel-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debug-modules-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debug-modules-extra-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debuginfo-common-aarch64-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-devel-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-headers-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-modules-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-modules-extra-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-tools-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-tools-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-tools-libs-4.18.0-193.93.1.el8_2.aarch64.rpm perf-4.18.0-193.93.1.el8_2.aarch64.rpm perf-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm python3-perf-4.18.0-193.93.1.el8_2.aarch64.rpm python3-perf-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm noarch: kernel-abi-whitelists-4.18.0-193.93.1.el8_2.noarch.rpm kernel-doc-4.18.0-193.93.1.el8_2.noarch.rpm ppc64le: bpftool-4.18.0-193.93.1.el8_2.ppc64le.rpm bpftool-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-core-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-cross-headers-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debug-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debug-core-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debug-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debug-devel-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debug-modules-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debug-modules-extra-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-devel-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-headers-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-modules-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-modules-extra-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-tools-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-tools-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-tools-libs-4.18.0-193.93.1.el8_2.ppc64le.rpm perf-4.18.0-193.93.1.el8_2.ppc64le.rpm perf-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm python3-perf-4.18.0-193.93.1.el8_2.ppc64le.rpm python3-perf-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm s390x: bpftool-4.18.0-193.93.1.el8_2.s390x.rpm bpftool-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm kernel-4.18.0-193.93.1.el8_2.s390x.rpm kernel-core-4.18.0-193.93.1.el8_2.s390x.rpm kernel-cross-headers-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debug-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debug-core-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debug-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debug-devel-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debug-modules-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debug-modules-extra-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debuginfo-common-s390x-4.18.0-193.93.1.el8_2.s390x.rpm kernel-devel-4.18.0-193.93.1.el8_2.s390x.rpm kernel-headers-4.18.0-193.93.1.el8_2.s390x.rpm kernel-modules-4.18.0-193.93.1.el8_2.s390x.rpm kernel-modules-extra-4.18.0-193.93.1.el8_2.s390x.rpm kernel-tools-4.18.0-193.93.1.el8_2.s390x.rpm kernel-tools-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm kernel-zfcpdump-4.18.0-193.93.1.el8_2.s390x.rpm kernel-zfcpdump-core-4.18.0-193.93.1.el8_2.s390x.rpm kernel-zfcpdump-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm kernel-zfcpdump-devel-4.18.0-193.93.1.el8_2.s390x.rpm kernel-zfcpdump-modules-4.18.0-193.93.1.el8_2.s390x.rpm kernel-zfcpdump-modules-extra-4.18.0-193.93.1.el8_2.s390x.rpm perf-4.18.0-193.93.1.el8_2.s390x.rpm perf-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm python3-perf-4.18.0-193.93.1.el8_2.s390x.rpm python3-perf-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm x86_64: bpftool-4.18.0-193.93.1.el8_2.x86_64.rpm bpftool-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-core-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-cross-headers-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debug-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debug-core-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debug-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debug-devel-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debug-modules-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debug-modules-extra-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debuginfo-common-x86_64-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-devel-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-headers-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-modules-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-modules-extra-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-tools-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-tools-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-tools-libs-4.18.0-193.93.1.el8_2.x86_64.rpm perf-4.18.0-193.93.1.el8_2.x86_64.rpm perf-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm python3-perf-4.18.0-193.93.1.el8_2.x86_64.rpm python3-perf-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBY2FrqdzjgjWX9erEAQjbTw/+Ps/k3la19UWPfhXXquENlVWAjtSU+2al YnHn/MYUA6aKoNDiSrzqnPTRgrLGymgTNzvRkc4s+A/ZduwWrlVeJv39tXGx1GrV jdjuDXhigMHxaNFH5nlnQMYUhT5bGhOdPXIAuYkQc2j1lySXXs8LBK17E4vav4XD q5MEAkYC7n3WRR6i0c9cpEFBaWbysPE1NkMaJ9Ofc5kCFW4eaW/1IloahR/g0ifN drkBK160d1I2PoMLIF25rWE62viDwiZQZXqZ54UzzUnD1auzKTP3tOwyYrsi+lLU 1x9Wcik925mXtt+6m1FavuE2yPVs0kzQ34Q7mUinRchwKQUkiP643t2tadOCwDVx jOygsdFlzwm1ODZo7NG/xM3tLHxqbMXy0nV/YIJ1tbHEOxfcYMtIUQaOf5zfJzBr uVajIReonF0qZiNxVsdR/gl22t2jjIOaAPsmTq6h2KRZI2qEsI7Y+IgPKjDcCtzS noK0+G+x4k8hn0FDOA+4+4cd3aXhpEORxtjkRbJ7t12e1E1ZIck0SVOzoqjoAq7p LmPVxRZBQWVqIcR5IHKx7EZYLxRBLPR74u4zuK86VpESJm8Ie15YiXHY4RpbJFfa NgpWn5XipOXMl6KzyE5bEyzAle/NyhwoMX6kJ7gPP7irOeBpDVoVG2Go+Iq1xHvB ZPiXszO1jjc=k0bc -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . Description: Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.8.53. See the following advisory for the RPM packages for this release: https://access.redhat.com/errata/RHBA-2022:7873 Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes: https://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html Security Fix(es): * go-getter: command injection vulnerability (CVE-2022-26945) * go-getter: unsafe download (issue 1 of 3) (CVE-2022-30321) * go-getter: unsafe download (issue 2 of 3) (CVE-2022-30322) * go-getter: unsafe download (issue 3 of 3) (CVE-2022-30323) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Solution: For OpenShift Container Platform 4.8 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html You may download the oc tool and use it to inspect release image metadata for x86_64, s390x, and ppc64le architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags The sha values for the release are: (For x86_64 architecture) The image digest is sha256:ac2bbfa7036c64bbdb44f9a74df3dbafcff1b851d812bf2a48c4fabcac3c7a53 (For s390x architecture) The image digest is sha256:ac2c74a664257cea299126d4f789cdf9a5a4efc4a4e8c2361b943374d4eb21e4 (For ppc64le architecture) The image digest is sha256:53adc42ed30ad39d7117837dbf5a6db6943a8f0b3b61bc0d046b83394f5c28b2 All OpenShift Container Platform 4.8 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html 4. Bugs fixed (https://bugzilla.redhat.com/): 2077100 - Console backend check for Web Terminal Operator incorrectly returns HTTP 204 2092918 - CVE-2022-30321 go-getter: unsafe download (issue 1 of 3) 2092923 - CVE-2022-30322 go-getter: unsafe download (issue 2 of 3) 2092925 - CVE-2022-30323 go-getter: unsafe download (issue 3 of 3) 2092928 - CVE-2022-26945 go-getter: command injection vulnerability 5. JIRA issues fixed (https://issues.jboss.org/): OCPBUGS-2205 - Prefer local dns does not work expectedly on OCPv4.8 OCPBUGS-2347 - [cluster-api-provider-baremetal] fix 4.8 build OCPBUGS-2577 - [4.8] ETCD Operator goes degraded when a second internal node ip is added OCPBUGS-2773 - e2e tests: Installs Red Hat Integration - 3scale operator test is failing due to change of Operator name OCPBUGS-2989 - [4.8] cri-o should report the stage of container and pod creation it's stuck at 6. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. Bugs fixed (https://bugzilla.redhat.com/): 2094982 - CVE-2022-1996 go-restful: Authorization Bypass Through User-Controlled Key 2130218 - 4.9.7 containers 5

Trust: 2.25

sources: NVD: CVE-2022-21125 // CNNVD: CNNVD-202206-1339 // VULHUB: VHN-406836 // PACKETSTORM: 168426 // PACKETSTORM: 169409 // PACKETSTORM: 167549 // PACKETSTORM: 167785 // PACKETSTORM: 168461 // PACKETSTORM: 169688 // PACKETSTORM: 169941 // PACKETSTORM: 169997

AFFECTED PRODUCTS

vendor:vmwaremodel:esxiscope:eqversion:7.0

Trust: 1.0

vendor:intelmodel:sgx sdkscope:ltversion:2.17.100.3

Trust: 1.0

vendor:xenmodel:xenscope:eqversion:*

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:intelmodel:sgx sdkscope:ltversion:2.16.100.3

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:36

Trust: 1.0

vendor:intelmodel:sgx dcapscope:ltversion:1.14.100.3

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:35

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:11.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:intelmodel:sgx pswscope:ltversion:2.17.100.3

Trust: 1.0

vendor:intelmodel:sgx pswscope:ltversion:2.16.100.3

Trust: 1.0

sources: NVD: CVE-2022-21125

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-21125
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-202206-1339
value: MEDIUM

Trust: 0.6

VULHUB: VHN-406836
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2022-21125
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-406836
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2022-21125
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-406836 // CNNVD: CNNVD-202206-1339 // NVD: CVE-2022-21125

PROBLEMTYPE DATA

problemtype:CWE-459

Trust: 1.1

sources: VULHUB: VHN-406836 // NVD: CVE-2022-21125

THREAT TYPE

local

Trust: 0.8

sources: PACKETSTORM: 167549 // PACKETSTORM: 167785 // CNNVD: CNNVD-202206-1339

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-202206-1339

PATCH

title:Microsoft Windows Repair measures for information disclosure vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=196895

Trust: 0.6

sources: CNNVD: CNNVD-202206-1339

EXTERNAL IDS

db:NVDid:CVE-2022-21125

Trust: 2.5

db:OPENWALLid:OSS-SECURITY/2022/06/16/1

Trust: 1.7

db:PACKETSTORMid:167785

Trust: 0.8

db:PACKETSTORMid:169941

Trust: 0.8

db:PACKETSTORMid:169997

Trust: 0.8

db:PACKETSTORMid:168461

Trust: 0.8

db:PACKETSTORMid:167549

Trust: 0.8

db:PACKETSTORMid:169719

Trust: 0.7

db:PACKETSTORMid:168294

Trust: 0.7

db:PACKETSTORMid:168021

Trust: 0.7

db:PACKETSTORMid:168503

Trust: 0.7

db:PACKETSTORMid:169695

Trust: 0.7

db:PACKETSTORMid:168076

Trust: 0.7

db:PACKETSTORMid:168694

Trust: 0.7

db:PACKETSTORMid:167862

Trust: 0.7

db:PACKETSTORMid:168364

Trust: 0.7

db:PACKETSTORMid:167692

Trust: 0.7

db:PACKETSTORMid:170226

Trust: 0.7

db:PACKETSTORMid:168426

Trust: 0.7

db:AUSCERTid:ESB-2022.3435

Trust: 0.6

db:AUSCERTid:ESB-2022.5876

Trust: 0.6

db:AUSCERTid:ESB-2022.3737

Trust: 0.6

db:AUSCERTid:ESB-2022.4672

Trust: 0.6

db:AUSCERTid:ESB-2022.3104

Trust: 0.6

db:AUSCERTid:ESB-2022.3755

Trust: 0.6

db:AUSCERTid:ESB-2022.3312

Trust: 0.6

db:AUSCERTid:ESB-2022.4312

Trust: 0.6

db:AUSCERTid:ESB-2022.3517

Trust: 0.6

db:AUSCERTid:ESB-2022.3018

Trust: 0.6

db:AUSCERTid:ESB-2022.3247

Trust: 0.6

db:AUSCERTid:ESB-2022.2926

Trust: 0.6

db:AUSCERTid:ESB-2022.3238

Trust: 0.6

db:AUSCERTid:ESB-2022.5057

Trust: 0.6

db:AUSCERTid:ESB-2022.3086

Trust: 0.6

db:AUSCERTid:ESB-2022.5536

Trust: 0.6

db:AUSCERTid:ESB-2022.6062

Trust: 0.6

db:AUSCERTid:ESB-2022.2972

Trust: 0.6

db:AUSCERTid:ESB-2022.6111

Trust: 0.6

db:AUSCERTid:ESB-2022.5590

Trust: 0.6

db:AUSCERTid:ESB-2022.4436

Trust: 0.6

db:AUSCERTid:ESB-2022.4757

Trust: 0.6

db:AUSCERTid:ESB-2022.3695

Trust: 0.6

db:AUSCERTid:ESB-2022.3829

Trust: 0.6

db:AUSCERTid:ESB-2022.3601

Trust: 0.6

db:PACKETSTORMid:168724

Trust: 0.6

db:PACKETSTORMid:169411

Trust: 0.6

db:CS-HELPid:SB2022072123

Trust: 0.6

db:CS-HELPid:SB2022072010

Trust: 0.6

db:CS-HELPid:SB2022070220

Trust: 0.6

db:CS-HELPid:SB2022071617

Trust: 0.6

db:CS-HELPid:SB2022070744

Trust: 0.6

db:CS-HELPid:SB2022070743

Trust: 0.6

db:CS-HELPid:SB2022072738

Trust: 0.6

db:CS-HELPid:SB2022071354

Trust: 0.6

db:CS-HELPid:SB2022062024

Trust: 0.6

db:CNNVDid:CNNVD-202206-1339

Trust: 0.6

db:PACKETSTORMid:169688

Trust: 0.2

db:PACKETSTORMid:169690

Trust: 0.1

db:PACKETSTORMid:168018

Trust: 0.1

db:PACKETSTORMid:167545

Trust: 0.1

db:PACKETSTORMid:168355

Trust: 0.1

db:VULHUBid:VHN-406836

Trust: 0.1

db:PACKETSTORMid:169409

Trust: 0.1

sources: VULHUB: VHN-406836 // PACKETSTORM: 168426 // PACKETSTORM: 169409 // PACKETSTORM: 167549 // PACKETSTORM: 167785 // PACKETSTORM: 168461 // PACKETSTORM: 169688 // PACKETSTORM: 169941 // PACKETSTORM: 169997 // CNNVD: CNNVD-202206-1339 // NVD: CVE-2022-21125

REFERENCES

url:http://xenbits.xen.org/xsa/advisory-404.html

Trust: 1.7

url:https://security.netapp.com/advisory/ntap-20220624-0008/

Trust: 1.7

url:https://www.debian.org/security/2022/dsa-5173

Trust: 1.7

url:https://www.debian.org/security/2022/dsa-5178

Trust: 1.7

url:https://www.debian.org/security/2022/dsa-5184

Trust: 1.7

url:https://security.gentoo.org/glsa/202208-23

Trust: 1.7

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html

Trust: 1.7

url:https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html

Trust: 1.7

url:http://www.openwall.com/lists/oss-security/2022/06/16/1

Trust: 1.7

url:https://access.redhat.com/security/cve/cve-2022-21125

Trust: 1.2

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/mcvomhbqrh4kp7in6u24cw7f2d2l5kbs/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/t4p2kjyl74kglhe4jzetvw7pzh6ziaba/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/rkrxz4lhgcgmog24zcejny6r2bts4s2q/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/fhtew3rxu2gw6s3rcpqg4vnczgi3tosv/

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2022-21166

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-21123

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-21125

Trust: 0.8

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/t4p2kjyl74kglhe4jzetvw7pzh6ziaba/

Trust: 0.7

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/rkrxz4lhgcgmog24zcejny6r2bts4s2q/

Trust: 0.7

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/fhtew3rxu2gw6s3rcpqg4vnczgi3tosv/

Trust: 0.7

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/mcvomhbqrh4kp7in6u24cw7f2d2l5kbs/

Trust: 0.7

url:https://access.redhat.com/security/cve/cve-2022-21123

Trust: 0.6

url:https://access.redhat.com/security/team/contact/

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2022-21166

Trust: 0.6

url:https://bugzilla.redhat.com/):

Trust: 0.6

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.6

url:https://packetstormsecurity.com/files/167862/ubuntu-security-notice-usn-5535-1.html

Trust: 0.6

url:https://packetstormsecurity.com/files/169411/red-hat-security-advisory-2022-6991-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/169719/red-hat-security-advisory-2022-7216-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3517

Trust: 0.6

url:https://packetstormsecurity.com/files/167785/ubuntu-security-notice-usn-5529-1.html

Trust: 0.6

url:https://packetstormsecurity.com/files/168694/red-hat-security-advisory-2022-6872-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/169997/red-hat-security-advisory-2022-8609-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.6111

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3086

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022071617

Trust: 0.6

url:https://packetstormsecurity.com/files/168294/red-hat-security-advisory-2022-6252-02.html

Trust: 0.6

url:https://packetstormsecurity.com/files/168426/red-hat-security-advisory-2022-6537-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/168503/red-hat-security-advisory-2022-6560-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3247

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3601

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022071354

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2022-21125/

Trust: 0.6

url:https://vigilance.fr/vulnerability/intel-processor-information-disclosure-via-processor-mmio-stale-data-38590

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022072123

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022070220

Trust: 0.6

url:https://packetstormsecurity.com/files/168076/gentoo-linux-security-advisory-202208-23.html

Trust: 0.6

url:https://packetstormsecurity.com/files/168461/red-hat-security-advisory-2022-6536-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.5590

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3695

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.5876

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3018

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3737

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.2926

Trust: 0.6

url:https://packetstormsecurity.com/files/169695/red-hat-security-advisory-2022-7211-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/168021/red-hat-security-advisory-2022-5937-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/167549/ubuntu-security-notice-usn-5485-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.4672

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.4312

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.2972

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3104

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022070743

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022070744

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.4436

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.4757

Trust: 0.6

url:https://msrc.microsoft.com/update-guide/vulnerability/cve-2022-21125

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb20220720108

Trust: 0.6

url:https://packetstormsecurity.com/files/168364/red-hat-security-advisory-2022-6437-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3829

Trust: 0.6

url:https://packetstormsecurity.com/files/168724/red-hat-security-advisory-2022-6954-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/170226/red-hat-security-advisory-2022-8973-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/167692/ubuntu-security-notice-usn-5485-2.html

Trust: 0.6

url:https://packetstormsecurity.com/files/169941/red-hat-security-advisory-2022-7874-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.6062

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022062024

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022072738

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.5057

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3312

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3435

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3238

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3755

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.5536

Trust: 0.6

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2022-2588

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2022-2588

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-45486

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-45486

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2021-45485

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-45485

Trust: 0.3

url:https://access.redhat.com/articles/11258

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-0391

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-20107

Trust: 0.2

url:https://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-34903

Trust: 0.2

url:https://access.redhat.com/errata/rhsa-2022:6536

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2015-20107

Trust: 0.2

url:https://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-0391

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-34903

Trust: 0.2

url:https://access.redhat.com/security/team/key/

Trust: 0.2

url:https://issues.jboss.org/):

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-41974

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-38561

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-21698

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:6537

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-21698

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-38561

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:6983

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws-5.4/5.4.0-1080.87~18.04.1

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5485-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/5.13.0-1031.37

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-ibm-5.4/5.4.0-1028.32~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/5.13.0-1030.33

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gke/5.15.0-1010.13

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-ibm/5.4.0-1028.32

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/5.4.0-1085.90

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1101.112

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/5.15.0-1011.15

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe-5.13/5.13.0-51.58~20.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gkeop-5.4/5.4.0-1048.51~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure-5.13/5.13.0-1031.37~20.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/5.4.0-1070.75

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp-5.4/5.4.0-1080.87~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1136.147

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1122.127

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gkeop/5.4.0-1048.51

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-ibm/5.15.0-1009.11

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/5.13.0-1033.40

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/5.13.0-1036.43

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/5.15.0-1012.14

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure-4.15/4.15.0-1145.160

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure-fde/5.4.0-1085.90+cvm1.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.15.0-187.198

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/5.13.0-51.58

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/5.15.0-39.42

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-dell300x/4.15.0-1048.53

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp-4.15/4.15.0-1130.146

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle-5.4/5.4.0-1078.86~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure-5.4/5.4.0-1085.90~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/5.15.0-1010.15

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/5.4.0-1080.87

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gke/5.4.0-1076.82

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle-5.13/5.13.0-1036.43~20.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/5.4.0-1078.86

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/5.4.0-120.136

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws-5.13/5.13.0-1031.35~20.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/5.15.0-1012.15

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp-5.13/5.13.0-1033.40~20.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gke-5.4/5.4.0-1076.82~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-intel-5.13/5.13.0-1017.19

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/5.4.0-1080.87

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe-5.4/5.4.0-120.136~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/5.13.0-1031.35

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-intel-iotg/5.15.0-1010.14

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/5.15.0-1013.17

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-lowlatency/5.15.0-39.42

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1789

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2078

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1679

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5529-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1973

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oem-5.17/5.17.0-1013.14

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1852

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1652

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-28199

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3121

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3121

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-30629

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:6535

Trust: 0.1

url:https://github.com/openshift/kubernetes/pull/1295

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-28199

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-30629

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:7279

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-30322

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-21626

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-21626

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-30322

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-30321

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-21628

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:7874

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-39399

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-30321

Trust: 0.1

url:https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-21619

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-26945

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-21618

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-21624

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-21624

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-21618

Trust: 0.1

url:https://access.redhat.com/errata/rhba-2022:7873

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-21628

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-21619

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-30323

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-26945

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-40674

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-38177

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-40674

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1996

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1996

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-41974

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:8609

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3515

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3515

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-38177

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-38178

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-38178

Trust: 0.1

sources: VULHUB: VHN-406836 // PACKETSTORM: 168426 // PACKETSTORM: 169409 // PACKETSTORM: 167549 // PACKETSTORM: 167785 // PACKETSTORM: 168461 // PACKETSTORM: 169688 // PACKETSTORM: 169941 // PACKETSTORM: 169997 // CNNVD: CNNVD-202206-1339 // NVD: CVE-2022-21125

CREDITS

Red Hat

Trust: 0.6

sources: PACKETSTORM: 168426 // PACKETSTORM: 169409 // PACKETSTORM: 168461 // PACKETSTORM: 169688 // PACKETSTORM: 169941 // PACKETSTORM: 169997

SOURCES

db:VULHUBid:VHN-406836
db:PACKETSTORMid:168426
db:PACKETSTORMid:169409
db:PACKETSTORMid:167549
db:PACKETSTORMid:167785
db:PACKETSTORMid:168461
db:PACKETSTORMid:169688
db:PACKETSTORMid:169941
db:PACKETSTORMid:169997
db:CNNVDid:CNNVD-202206-1339
db:NVDid:CVE-2022-21125

LAST UPDATE DATE

2025-01-01T19:49:16.620000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-406836date:2022-08-19T00:00:00
db:CNNVDid:CNNVD-202206-1339date:2022-12-30T00:00:00
db:NVDid:CVE-2022-21125date:2024-11-21T06:43:56.937

SOURCES RELEASE DATE

db:VULHUBid:VHN-406836date:2022-06-15T00:00:00
db:PACKETSTORMid:168426date:2022-09-20T13:59:11
db:PACKETSTORMid:169409date:2022-10-18T22:30:43
db:PACKETSTORMid:167549date:2022-06-20T16:17:04
db:PACKETSTORMid:167785date:2022-07-21T20:41:25
db:PACKETSTORMid:168461date:2022-09-22T15:50:52
db:PACKETSTORMid:169688date:2022-11-02T14:59:50
db:PACKETSTORMid:169941date:2022-11-18T14:28:39
db:PACKETSTORMid:169997date:2022-11-23T15:18:44
db:CNNVDid:CNNVD-202206-1339date:2022-06-14T00:00:00
db:NVDid:CVE-2022-21125date:2022-06-15T20:15:17.547