VAR-202206-1106
Vulnerability from variot - Updated: 2026-04-10 22:23Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. It exists that some Intel processors did not properly perform cleanup during specific special register write operations. A local attacker could possibly use this to expose sensitive information. Bugs fixed (https://bugzilla.redhat.com/):
2045880 - CVE-2022-21698 prometheus/client_golang: Denial of service using InstrumentHandlerCounter 2100495 - CVE-2021-38561 golang: out-of-bounds read in golang.org/x/text/language leads to DoS
- Description:
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Bug Fix(es):
-
update RT source tree to the RHEL-8.4.z12 source tree (BZ#2119160)
-
using __this_cpu_add() in preemptible [00000000] - caller is __mod_memcg_lruvec_state+0x69/0x1c0 [None8.4.0.z] (BZ#2124454)
-
In addition this updates provides mitigations for the "Retbleed" speculative execution attack and the "MMIO stale data" vulnerabilities.
For additional information please refer to the following pages: https://xenbits.xen.org/xsa/advisory-404.html https://xenbits.xen.org/xsa/advisory-407.html
For the stable distribution (bullseye), these problems have been fixed in version 4.14.5+24-g87d90d511c-1.
We recommend that you upgrade your xen packages.
For the detailed security status of xen please refer to its security tracker page at: https://security-tracker.debian.org/tracker/xen
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmLRp7MACgkQEMKTtsN8 TjbUmQ/+PCIyYjQJgGT14YBFpKnI/JjdBNRUAlSMK7k3fPhk+J8sQrRx5MqwxRm3 poejebvnbn2KS1Z/NVaiPnS40ryOOUnLBKVDAHqRvnvrc2GwEblGCmUVaBn+cn4M 2OCG2wfpgSDk4sk83obDY1qcQW/676eGY47ULwkG9C+n6wNC8FParq71sCA6UQqy XSWlU7o7pc17l8B1c2yTzfdDeXjSaXe9pavxNXDrowLi7taeTn5GwzhH4x1fPWrs rGHCY8+Kk8Vq8jEIYmZA7bvKuIFcWkcdQpxcAtbgUvtCRzaid19tcf9McvltivKe HaHQhkDJxg32DHcefXMNsh+F0pgXoodh97PdqWtjs49jAkaNZb37Eyn4n7Qt4APm 4oKAT+QA5wYmfDsBzgAczzV9zgY3/nRvYKNH6q9VMOFE3gZfzdzvyHzpegf2VVtf 7DuJKTi61tlt6aSzcDHlzdUAwW7sHXKFLRxgQu6tFD7NbEHzgj0iBlcFOnKDwa2s hHOE6Hlj1GXZUKjol5pRjnM33qGMJmRhnq45qqWaGe21r+EFw2HTAyCacJciPX+a QZ4LEy5+zmc8LFBcZq9kZAVkc91EtTiTPjffqHaVd4eAZvxtgCbqdXFdyRZa9ZRD +2+e1dRoiIF6L5PotQygXyKwvxU8ca6Ni9isvit3brbLjcGjhZk= =pXvE -----END PGP SIGNATURE----- .
Security Fix(es):
-
off-path attacker may inject data or terminate victim's TCP session (CVE-2020-36516)
-
use-after-free vulnerability in function sco_sock_sendmsg() (CVE-2021-3640)
-
smb2_ioctl_query_info NULL pointer dereference (CVE-2022-0168)
-
NULL pointer dereference in udf_expand_file_adinicbdue() during writeback (CVE-2022-0617)
-
swiotlb information leak with DMA_FROM_DEVICE (CVE-2022-0854)
-
uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM (CVE-2022-1016)
-
race condition in snd_pcm_hw_free leading to use-after-free (CVE-2022-1048)
-
use-after-free and memory errors in ext4 when mounting and operating on a corrupted image (CVE-2022-1184)
-
concurrency use-after-free between drm_setmaster_ioctl and drm_mode_getresources (CVE-2022-1280)
-
kernel info leak issue in pfkey_register (CVE-2022-1353)
-
use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges (CVE-2022-1679)
-
NULL pointer dereference in x86_emulate_insn may lead to DoS (CVE-2022-1852)
-
fanotify misuses fd_install() which could lead to use-after-free (CVE-2022-1998)
-
nf_tables cross-table potential use-after-free may lead to local privilege escalation (CVE-2022-2586)
-
integer underflow leads to out-of-bounds write in reserve_sfa_size() (CVE-2022-2639)
-
slab-out-of-bounds access in packet_recvmsg() (CVE-2022-20368)
-
incomplete clean-up of multi-core shared buffers (aka SBDR) (CVE-2022-21123)
-
incomplete clean-up of microarchitectural fill buffers (aka SBDS) (CVE-2022-21125)
-
incomplete clean-up in specific special register write operations (aka DRPW) (CVE-2022-21166)
-
possible to use the debugger to write zero into a location of choice (CVE-2022-21499)
-
AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-23816, CVE-2022-29900)
-
AMD: Branch Type Confusion (non-retbleed) (CVE-2022-23825)
-
Intel: Post-barrier Return Stack Buffer Predictions (CVE-2022-26373)
-
double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c (CVE-2022-28390)
-
use after free in SUNRPC subsystem (CVE-2022-28893)
-
use-after-free due to improper update of reference count in net/sched/cls_u32.c (CVE-2022-29581)
-
Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-29901)
-
DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c (CVE-2022-36946)
-
nf_tables disallow binding to already bound chain (CVE-2022-39190)
-
nfs_atomic_open() returns uninitialized data instead of ENOTDIR (CVE-2022-24448)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.1 Release Notes linked from the References section. Bugs fixed (https://bugzilla.redhat.com/):
1905809 - [RHEL-9] WARNING: CPU: 0 PID: 13059 at fs/nfsd/nfs4proc.c:458 nfsd4_open+0x19c/0x4a0 [nfsd] 1951971 - [RFE] Bonding: add option ns_ipv6_target 1952053 - [RFE] Bonding: add link_watch.missed_max 1980646 - CVE-2021-3640 kernel: use-after-free vulnerability in function sco_sock_sendmsg() 2006399 - limited reexport support kernel documentation 2009423 - fs: dlm: dlm_callback_resume is too noisy 2025985 - Add acer_wireless.ko kernel module 2028370 - [xfstests/nfs generic/476] test never finishes 2037386 - CVE-2022-0168 kernel: smb2_ioctl_query_info NULL pointer dereference 2038794 - Backport futex_waitv() from Linux 5.16 2046624 - [Marvell 9.1 FEAT] update qedi driver to latest upstream 2051444 - CVE-2022-24448 kernel: nfs_atomic_open() returns uninitialized data instead of ENOTDIR 2052312 - CVE-2022-1998 kernel: fanotify misuses fd_install() which could lead to use-after-free 2053632 - CVE-2022-0617 kernel: NULL pointer dereference in udf_expand_file_adinicbdue() during writeback 2053991 - kernel build fails if CONFIG_RHEL_DIFFERENCES is "not set" 2054023 - vrf test fail in kselftest net:fcnal-test.sh 2058395 - CVE-2022-0854 kernel: swiotlb information leak with DMA_FROM_DEVICE 2059928 - CVE-2020-36516 kernel: off-path attacker may inject data or terminate victim's TCP session 2066297 - block layer: update to v5.17 2066614 - CVE-2022-1016 kernel: uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM 2066706 - CVE-2022-1048 kernel: race condition in snd_pcm_hw_free leading to use-after-free 2066819 - CVE-2022-1353 kernel: kernel info leak issue in pfkey_register 2070205 - CVE-2022-1184 kernel: use-after-free and memory errors in ext4 when mounting and operating on a corrupted image 2071022 - CVE-2022-1280 kernel: concurrency use-after-free between drm_setmaster_ioctl and drm_mode_getresources 2073064 - CVE-2022-28390 kernel: double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c 2074208 - CVE-2022-28893 kernel: use after free in SUNRPC subsystem 2074315 - genirq/affinity: Consider that CPUs on nodes can be unbalanced 2076304 - VFIO refresh to v5.18 2083580 - RFE: backport minor fixes and cleanups from upstream (up to version 5.18-rc5) 2084125 - CVE-2022-1679 kernel: use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges 2084183 - CVE-2022-21499 kernel: possible to use the debugger to write zero into a location of choice 2084479 - CVE-2022-2639 kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() 2088021 - CVE-2022-29581 kernel: use-after-free due to improper update of reference count in net/sched/cls_u32.c 2089815 - CVE-2022-1852 kernel: NULL pointer dereference in x86_emulate_insn may lead to DoS 2090226 - CVE-2022-23816 CVE-2022-29900 hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions 2090237 - CVE-2022-21123 hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR) 2090240 - CVE-2022-21125 hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS) 2090241 - CVE-2022-21166 hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW) 2094045 - mm: Fix stall observed when xfs calls alloc_pages_bulk_array() 2095275 - [RHEL-9] NFS - Fix "softreval" mount option 2100261 - backport audit iouring fix and audit_log_kern_module memleak fix from v5.18 and v5.19-rc3 2102319 - ipmitool sensor list command generates syslog errors on HP iLO 5 2103148 - CVE-2022-29901 hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions 2103153 - CVE-2022-23825 hw: cpu: AMD: Branch Type Confusion (non-retbleed) 2107360 - knfsd not always recalling delegations on contended access 2107589 - backport vsock commits for RHEL-9.1 2109349 - [bonding] bugfix update from v5.19 2110576 - RHEL-9 nfsd server post_wcc fixes - clients see increased revalidations 2111270 - netfilter: rebase conntrack to 5.19 2114878 - CVE-2022-2586 kernel: nf_tables cross-table potential use-after-free may lead to local privilege escalation 2115065 - CVE-2022-26373 hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions 2115278 - CVE-2022-36946 kernel: DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c 2123695 - CVE-2022-20368 kernel: net/packet: slab-out-of-bounds access in packet_recvmsg() 2129152 - CVE-2022-39190 kernel: nf_tables disallow binding to already bound chain
- Bugs fixed (https://bugzilla.redhat.com/):
1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation 2024946 - Ingress Canary does not respect router sharding on default IngressController 2104825 - Installer creates unnecessary master_ingress_cluster_policy_controller security group rule 2108214 - Route status isn't always getting cleared with routeSelector updates 2108595 - etcd Dashboard should be removed on guest cluster of hypershift 2109193 - Power VS machine Processor is always defaulted to 0.5 2109887 - [UI] MultiClusterHub details after it's creation starts flickers, disappears and appears back (happened twice) 2110528 - Route status isn't always getting cleared with routeSelector updates 2111345 - should use the same value for AlertRelabelConfig with oc explain 2117424 - Backport: https://github.com/openshift/kubernetes/pull/1295
- JIRA issues fixed (https://issues.jboss.org/):
OCPBUGS-1007 - CVE-2021-3121 telemeter-container: [1924548] telemeter-container: gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation [openshift-4] OCPBUGS-1070 - Update ODC owners OCPBUGS-1104 - package-server-manager does not migrate packageserver CSV from v0.17.0 to v0.18.3 on OCP 4.8 -> 4.9 upgrade OCPBUGS-1145 - Bug 2085336 - [IPI-Azure] Fail to create the worker node which HyperVGenerations is V2 or V1 and vmNetworkingType is Accelerated OCPBUGS-1233 - [IPI] nodelink controller is not able to reconcile and match nodes and machines with logical interfaces defined by nmstate at baremetalhost creation OCPBUGS-1261 - Backport: https://github.com/openshift/kubernetes/pull/1295 OCPBUGS-393 - Setting disableNetworkDiagnostics: true does not persist when network-operator pod gets re-created OCPBUGS-455 - [vsphere] update install-config description for diskType OCPBUGS-524 - Plugin page error boundary message is not cleared after leaving page OCPBUGS-668 - Prefer local dns does not work expectedly on OCPv4.11 OCPBUGS-744 - [4.11] Spoke BMH stuck ?provisioning? after changing a BIOS attribute via the converged workflow OCPBUGS-746 - [4.11] Supermicro server FirmwareSchema CR does not contain allowable_values, attribute_type and read_only flag OCPBUGS-747 - [4.11] Disconnected IPI OCP cluster install on baremetal fails when hostname of master nodes does not include the text "master
-
Gentoo Linux Security Advisory GLSA 202208-23
https://security.gentoo.org/
Severity: High Title: Xen: Multiple Vulnerabilities Date: August 14, 2022 Bugs: #810341, #812485, #816882, #825354, #832039, #835401, #850802 ID: 202208-23
Synopsis
Multiple vulnerabilities have been discovered in Xen, the worst of which could result in remote code execution (guest sandbox escape).
Background
Xen is a bare-metal hypervisor.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 app-emulation/xen < 4.15.3 >= 4.15.3 2 app-emulation/xen-tools < 4.15.3 >= 4.15.3
Description
Multiple vulnerabilities have been discovered in Xen. Please review the CVE identifiers referenced below for details.
Impact
Please review the referenced CVE identifiers for details.
Workaround
There is no known workaround at this time.
Resolution
All Xen users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-emulation/xen-4.15.3"
All Xen tools users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-emulation/xen-tools-4.15.3"
References
[ 1 ] CVE-2021-28694 https://nvd.nist.gov/vuln/detail/CVE-2021-28694 [ 2 ] CVE-2021-28695 https://nvd.nist.gov/vuln/detail/CVE-2021-28695 [ 3 ] CVE-2021-28696 https://nvd.nist.gov/vuln/detail/CVE-2021-28696 [ 4 ] CVE-2021-28697 https://nvd.nist.gov/vuln/detail/CVE-2021-28697 [ 5 ] CVE-2021-28698 https://nvd.nist.gov/vuln/detail/CVE-2021-28698 [ 6 ] CVE-2021-28699 https://nvd.nist.gov/vuln/detail/CVE-2021-28699 [ 7 ] CVE-2021-28700 https://nvd.nist.gov/vuln/detail/CVE-2021-28700 [ 8 ] CVE-2021-28701 https://nvd.nist.gov/vuln/detail/CVE-2021-28701 [ 9 ] CVE-2021-28702 https://nvd.nist.gov/vuln/detail/CVE-2021-28702 [ 10 ] CVE-2021-28710 https://nvd.nist.gov/vuln/detail/CVE-2021-28710 [ 11 ] CVE-2022-21123 https://nvd.nist.gov/vuln/detail/CVE-2022-21123 [ 12 ] CVE-2022-21125 https://nvd.nist.gov/vuln/detail/CVE-2022-21125 [ 13 ] CVE-2022-21166 https://nvd.nist.gov/vuln/detail/CVE-2022-21166 [ 14 ] CVE-2022-23033 https://nvd.nist.gov/vuln/detail/CVE-2022-23033 [ 15 ] CVE-2022-23034 https://nvd.nist.gov/vuln/detail/CVE-2022-23034 [ 16 ] CVE-2022-23035 https://nvd.nist.gov/vuln/detail/CVE-2022-23035 [ 17 ] CVE-2022-26362 https://nvd.nist.gov/vuln/detail/CVE-2022-26362 [ 18 ] CVE-2022-26363 https://nvd.nist.gov/vuln/detail/CVE-2022-26363 [ 19 ] CVE-2022-26364 https://nvd.nist.gov/vuln/detail/CVE-2022-26364 [ 20 ] XSA-378 [ 21 ] XSA-379 [ 22 ] XSA-380 [ 23 ] XSA-382 [ 24 ] XSA-383 [ 25 ] XSA-384 [ 26 ] XSA-386 [ 27 ] XSA-390 [ 28 ] XSA-401 [ 29 ] XSA-402 [ 30 ] XSA-404
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/202208-23
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2022 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5 . Bugs fixed (https://bugzilla.redhat.com/):
2107342 - CVE-2022-30631 golang: compress/gzip: stack exhaustion in Reader.Read
- -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
===================================================================== Red Hat Security Advisory
Synopsis: Moderate: kernel security, bug fix, and enhancement update Advisory ID: RHSA-2022:6460-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2022:6460 Issue date: 2022-09-13 CVE Names: CVE-2022-21123 CVE-2022-21125 CVE-2022-21166 =====================================================================
- Summary:
An update for kernel is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat CodeReady Linux Builder (v. 8) - aarch64, ppc64le, x86_64 Red Hat Enterprise Linux BaseOS (v. 8) - aarch64, noarch, ppc64le, s390x, x86_64
- Description:
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Bug Fix(es):
-
Bad page state in process qemu-kvm pfn:68a74600 (BZ#2081013)
-
slub corruption during LPM of hnv interface (BZ#2081250)
-
Affinity broken due to vector space exhaustion (BZ#2084646)
-
'rmmod pmt_telemetry' panics on ADL-P IOTG (BZ#2091079)
-
Unable to boot RHEL-8.6 on Brazos max. config (Install is success) (BZ#2092241)
-
kernel crash after reboot of T14/G2 AMD laptop (mt7921e module) (BZ#2095654)
-
mt7921: free resources on pci_probe error path (BZ#2101684)
-
NLM should be more defensive if underlying FS changes fl_owner (BZ#2102099)
-
RHEL8/async-pf Guest call trace when reboot after postcopy migration with high stress workload (BZ#2105340)
-
execve exit tracepoint not called (BZ#2106662)
-
QProcess dead lock on kernel-4.18.0-358 (BZ#2107643)
-
KVM fix guest FPU uABI size to kvm_xsave (BZ#2107652)
-
KVM selftests fail to compile (BZ#2107655)
-
Some monitor have no display with AMD W6400 when boot into OS. (BZ#2109826)
-
Percpu counter usage is gradually getting increasing during podman container recreation. (BZ#2110039)
-
multipath failed to recover after EEH hit on flavafish adapter on Denali(qla2xxx/flavafish/RHEL8.6/Denali) (BZ#2110768)
-
soft lockups under heavy I/O load to ahci connected SSDs (BZ#2110772)
-
trouble re-assigning MACs to VFs, ice stricter than other drivers (BZ#2111936)
-
Intel MPI 2019.0 - mpirun stuck on latest kernel (BZ#2112030)
-
Multicast packets are not received by all VFs on the same port even though they have the same VLAN (BZ#2117026)
-
Hyper-V 2019 Dynamic Memory Problem hv_balloon (BZ#2117050)
-
kernel BUG at kernel/sched/deadline.c:1561! (BZ#2117410)
-
ALSA (sound) driver - update Intel SOF kcontrol code (BZ#2117732)
-
bridge over bond over ice ports has no connection (BZ#2118580)
-
Fix max VLANs available for VF (BZ#2118581)
-
offline selftest failed (BZ#2118582)
-
INTEL NVMUpdate utility ver 3.20 is failing to update firmware on E810-XXVDA4T (WPC) (BZ#2118583)
-
VM configured with failover interface will coredump after been migrating from source host to target host(only iavf driver) (BZ#2118705)
-
Fix max VLANs available for untrusted VF (BZ#2118707)
-
Softlockup on infinite loop in task_get_css() for a CSS_DYING cpuset (BZ#2120776)
Enhancement(s):
-
KVM Sapphire Rapids (SPR) AMX Instructions (BZ#2088287)
-
KVM Sapphire Rapids (SPR) AMX Instructions part2 (BZ#2088288)
-
ice: Driver Update (BZ#2102359)
-
iavf: Driver Update (BZ#2102360)
-
iommu/vt-d: Make DMAR_UNITS_SUPPORTED a config setting (BZ#2112983)
-
Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
- Bugs fixed (https://bugzilla.redhat.com/):
2090237 - CVE-2022-21123 hw: cpu: Incomplete cleanup of multi-core shared buffers (aka SBDR) 2090240 - CVE-2022-21125 hw: cpu: Incomplete cleanup of microarchitectural fill buffers (aka SBDS) 2090241 - CVE-2022-21166 hw: cpu: Incomplete cleanup in specific special register write operations (aka DRPW)
- Package List:
Red Hat Enterprise Linux BaseOS (v. 8):
Source: kernel-4.18.0-372.26.1.el8_6.src.rpm
aarch64: bpftool-4.18.0-372.26.1.el8_6.aarch64.rpm bpftool-debuginfo-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-core-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-cross-headers-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-debug-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-debug-core-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-debug-debuginfo-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-debug-devel-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-debug-modules-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-debug-modules-extra-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-debuginfo-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-debuginfo-common-aarch64-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-devel-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-headers-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-modules-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-modules-extra-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-tools-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-tools-debuginfo-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-tools-libs-4.18.0-372.26.1.el8_6.aarch64.rpm perf-4.18.0-372.26.1.el8_6.aarch64.rpm perf-debuginfo-4.18.0-372.26.1.el8_6.aarch64.rpm python3-perf-4.18.0-372.26.1.el8_6.aarch64.rpm python3-perf-debuginfo-4.18.0-372.26.1.el8_6.aarch64.rpm
noarch: kernel-abi-stablelists-4.18.0-372.26.1.el8_6.noarch.rpm kernel-doc-4.18.0-372.26.1.el8_6.noarch.rpm
ppc64le: bpftool-4.18.0-372.26.1.el8_6.ppc64le.rpm bpftool-debuginfo-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-core-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-cross-headers-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-debug-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-debug-core-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-debug-debuginfo-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-debug-devel-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-debug-modules-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-debug-modules-extra-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-debuginfo-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-devel-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-headers-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-modules-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-modules-extra-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-tools-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-tools-debuginfo-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-tools-libs-4.18.0-372.26.1.el8_6.ppc64le.rpm perf-4.18.0-372.26.1.el8_6.ppc64le.rpm perf-debuginfo-4.18.0-372.26.1.el8_6.ppc64le.rpm python3-perf-4.18.0-372.26.1.el8_6.ppc64le.rpm python3-perf-debuginfo-4.18.0-372.26.1.el8_6.ppc64le.rpm
s390x: bpftool-4.18.0-372.26.1.el8_6.s390x.rpm bpftool-debuginfo-4.18.0-372.26.1.el8_6.s390x.rpm kernel-4.18.0-372.26.1.el8_6.s390x.rpm kernel-core-4.18.0-372.26.1.el8_6.s390x.rpm kernel-cross-headers-4.18.0-372.26.1.el8_6.s390x.rpm kernel-debug-4.18.0-372.26.1.el8_6.s390x.rpm kernel-debug-core-4.18.0-372.26.1.el8_6.s390x.rpm kernel-debug-debuginfo-4.18.0-372.26.1.el8_6.s390x.rpm kernel-debug-devel-4.18.0-372.26.1.el8_6.s390x.rpm kernel-debug-modules-4.18.0-372.26.1.el8_6.s390x.rpm kernel-debug-modules-extra-4.18.0-372.26.1.el8_6.s390x.rpm kernel-debuginfo-4.18.0-372.26.1.el8_6.s390x.rpm kernel-debuginfo-common-s390x-4.18.0-372.26.1.el8_6.s390x.rpm kernel-devel-4.18.0-372.26.1.el8_6.s390x.rpm kernel-headers-4.18.0-372.26.1.el8_6.s390x.rpm kernel-modules-4.18.0-372.26.1.el8_6.s390x.rpm kernel-modules-extra-4.18.0-372.26.1.el8_6.s390x.rpm kernel-tools-4.18.0-372.26.1.el8_6.s390x.rpm kernel-tools-debuginfo-4.18.0-372.26.1.el8_6.s390x.rpm kernel-zfcpdump-4.18.0-372.26.1.el8_6.s390x.rpm kernel-zfcpdump-core-4.18.0-372.26.1.el8_6.s390x.rpm kernel-zfcpdump-debuginfo-4.18.0-372.26.1.el8_6.s390x.rpm kernel-zfcpdump-devel-4.18.0-372.26.1.el8_6.s390x.rpm kernel-zfcpdump-modules-4.18.0-372.26.1.el8_6.s390x.rpm kernel-zfcpdump-modules-extra-4.18.0-372.26.1.el8_6.s390x.rpm perf-4.18.0-372.26.1.el8_6.s390x.rpm perf-debuginfo-4.18.0-372.26.1.el8_6.s390x.rpm python3-perf-4.18.0-372.26.1.el8_6.s390x.rpm python3-perf-debuginfo-4.18.0-372.26.1.el8_6.s390x.rpm
x86_64: bpftool-4.18.0-372.26.1.el8_6.x86_64.rpm bpftool-debuginfo-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-core-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-cross-headers-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-debug-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-debug-core-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-debug-debuginfo-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-debug-devel-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-debug-modules-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-debug-modules-extra-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-debuginfo-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-debuginfo-common-x86_64-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-devel-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-headers-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-modules-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-modules-extra-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-tools-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-tools-debuginfo-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-tools-libs-4.18.0-372.26.1.el8_6.x86_64.rpm perf-4.18.0-372.26.1.el8_6.x86_64.rpm perf-debuginfo-4.18.0-372.26.1.el8_6.x86_64.rpm python3-perf-4.18.0-372.26.1.el8_6.x86_64.rpm python3-perf-debuginfo-4.18.0-372.26.1.el8_6.x86_64.rpm
Red Hat CodeReady Linux Builder (v. 8):
aarch64: bpftool-debuginfo-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-debug-debuginfo-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-debuginfo-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-debuginfo-common-aarch64-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-tools-debuginfo-4.18.0-372.26.1.el8_6.aarch64.rpm kernel-tools-libs-devel-4.18.0-372.26.1.el8_6.aarch64.rpm perf-debuginfo-4.18.0-372.26.1.el8_6.aarch64.rpm python3-perf-debuginfo-4.18.0-372.26.1.el8_6.aarch64.rpm
ppc64le: bpftool-debuginfo-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-debug-debuginfo-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-debuginfo-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-tools-debuginfo-4.18.0-372.26.1.el8_6.ppc64le.rpm kernel-tools-libs-devel-4.18.0-372.26.1.el8_6.ppc64le.rpm perf-debuginfo-4.18.0-372.26.1.el8_6.ppc64le.rpm python3-perf-debuginfo-4.18.0-372.26.1.el8_6.ppc64le.rpm
x86_64: bpftool-debuginfo-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-debug-debuginfo-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-debuginfo-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-debuginfo-common-x86_64-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-tools-debuginfo-4.18.0-372.26.1.el8_6.x86_64.rpm kernel-tools-libs-devel-4.18.0-372.26.1.el8_6.x86_64.rpm perf-debuginfo-4.18.0-372.26.1.el8_6.x86_64.rpm python3-perf-debuginfo-4.18.0-372.26.1.el8_6.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2022-21123 https://access.redhat.com/security/cve/CVE-2022-21125 https://access.redhat.com/security/cve/CVE-2022-21166 https://access.redhat.com/security/updates/classification/#moderate
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBYyCB1NzjgjWX9erEAQjx1g/+KpIc2rESQgtzICCW50Ha+ZjaOZiuIgGV 1wDzgsyj7JRxGOIhGY3edJp7sdtoT0+CoWTdjENZrNhQlQ9UhRSpJ+8vdGy5WooO fwwKBffteRMEl8YTO/U8fstclEKXK3MB93ZxEHgS0L3UQY/AUU5XqSzB4a4rV9RJ DpFQcnw3dHIrtMKHs4HMrm8+Q8ezq9UmVbl472ecnfmNXfHDhOmUGGlUrT22SX9p Zn/UXCiWZxIt+Vh2uTrIgs4hiSJPAqD/lGHjLQpaR26uciZnndLui2s4W91F7yN4 ZifRDwrSAMtsRoln7Z8HL6H59tw4vHwAY1rD5ATwk9EqhRtaetE+v0hzM+BRBhri dpZnKUhMiUDNTUKqmpbBZjh4IuSKI6AkaQenFnMQWTp027B6o0EjhqpiEdLaA0R/ pYewm2OKbulyoUeVhC5GOMX6g8ckGa5h2o4Fr+fkaptELQN1VniYEu88O7pRqaqR lW3MrcYIEowDxyiMLehgtIxjyawzfmi0fficXzCf8xEXm8fmqlrXu4lfhKV4g3WI Y9j8INFYc4inopUBsQM1zXWV00nCDxAvaYPhOYI0VjO11jxOCOcBheOlwS1sseOv Bjram7oqf2DuVSINeTAgbHMLMA4AGEcNMsOAN/mwdq6ZBpEYmCf48pvZwQscW7qv a685GRAjoyY= =4AwP -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . Description:
Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.
This advisory contains the container images for Red Hat OpenShift Container Platform 4.8.53. See the following advisory for the RPM packages for this release:
https://access.redhat.com/errata/RHBA-2022:7873
Space precludes documenting all of the container images in this advisory. Solution:
For OpenShift Container Platform 4.8 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:
https://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html
You may download the oc tool and use it to inspect release image metadata for x86_64, s390x, and ppc64le architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags
The sha values for the release are:
(For x86_64 architecture) The image digest is sha256:ac2bbfa7036c64bbdb44f9a74df3dbafcff1b851d812bf2a48c4fabcac3c7a53
(For s390x architecture) The image digest is sha256:ac2c74a664257cea299126d4f789cdf9a5a4efc4a4e8c2361b943374d4eb21e4
(For ppc64le architecture) The image digest is sha256:53adc42ed30ad39d7117837dbf5a6db6943a8f0b3b61bc0d046b83394f5c28b2
All OpenShift Container Platform 4.8 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html
- Bugs fixed (https://bugzilla.redhat.com/):
2077100 - Console backend check for Web Terminal Operator incorrectly returns HTTP 204 2092918 - CVE-2022-30321 go-getter: unsafe download (issue 1 of 3) 2092923 - CVE-2022-30322 go-getter: unsafe download (issue 2 of 3) 2092925 - CVE-2022-30323 go-getter: unsafe download (issue 3 of 3) 2092928 - CVE-2022-26945 go-getter: command injection vulnerability
- JIRA issues fixed (https://issues.jboss.org/):
OCPBUGS-2205 - Prefer local dns does not work expectedly on OCPv4.8 OCPBUGS-2347 - [cluster-api-provider-baremetal] fix 4.8 build OCPBUGS-2577 - [4.8] ETCD Operator goes degraded when a second internal node ip is added OCPBUGS-2773 - e2e tests: Installs Red Hat Integration - 3scale operator test is failing due to change of Operator name OCPBUGS-2989 - [4.8] cri-o should report the stage of container and pod creation it's stuck at
6
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "linux",
"scope": "eq",
"trust": 1.0,
"vendor": "debian",
"version": "11.0"
},
{
"_id": null,
"model": "fedora",
"scope": "eq",
"trust": 1.0,
"vendor": "fedoraproject",
"version": "35"
},
{
"_id": null,
"model": "sgx sdk",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "2.16.100.3"
},
{
"_id": null,
"model": "fedora",
"scope": "eq",
"trust": 1.0,
"vendor": "fedoraproject",
"version": "36"
},
{
"_id": null,
"model": "linux",
"scope": "eq",
"trust": 1.0,
"vendor": "debian",
"version": "9.0"
},
{
"_id": null,
"model": "sgx psw",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "2.16.100.3"
},
{
"_id": null,
"model": "linux",
"scope": "eq",
"trust": 1.0,
"vendor": "debian",
"version": "10.0"
},
{
"_id": null,
"model": "xen",
"scope": "eq",
"trust": 1.0,
"vendor": "xen",
"version": "*"
},
{
"_id": null,
"model": "sgx sdk",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "2.17.100.3"
},
{
"_id": null,
"model": "sgx psw",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "2.17.100.3"
},
{
"_id": null,
"model": "esxi",
"scope": "eq",
"trust": 1.0,
"vendor": "vmware",
"version": "7.0"
},
{
"_id": null,
"model": "sgx dcap",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "1.14.100.3"
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2022-21123"
}
]
},
"credits": {
"_id": null,
"data": "Red Hat",
"sources": [
{
"db": "PACKETSTORM",
"id": "168426"
},
{
"db": "PACKETSTORM",
"id": "169411"
},
{
"db": "PACKETSTORM",
"id": "169884"
},
{
"db": "PACKETSTORM",
"id": "168461"
},
{
"db": "PACKETSTORM",
"id": "168503"
},
{
"db": "PACKETSTORM",
"id": "168355"
},
{
"db": "PACKETSTORM",
"id": "169941"
}
],
"trust": 0.7
},
"cve": "CVE-2022-21123",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CVE-2022-21123",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "LOW",
"trust": 1.1,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "VHN-406835",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "LOW",
"trust": 0.1,
"vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2022-21123",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 2.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2022-21123",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"id": "CVE-2022-21123",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-406835",
"trust": 0.1,
"value": "LOW"
},
{
"author": "VULMON",
"id": "CVE-2022-21123",
"trust": 0.1,
"value": "LOW"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-406835"
},
{
"db": "VULMON",
"id": "CVE-2022-21123"
},
{
"db": "NVD",
"id": "CVE-2022-21123"
},
{
"db": "NVD",
"id": "CVE-2022-21123"
}
]
},
"description": {
"_id": null,
"data": "Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. It exists that some Intel processors did not properly perform\ncleanup during specific special register write operations. A local attacker\ncould possibly use this to expose sensitive information. Bugs fixed (https://bugzilla.redhat.com/):\n\n2045880 - CVE-2022-21698 prometheus/client_golang: Denial of service using InstrumentHandlerCounter\n2100495 - CVE-2021-38561 golang: out-of-bounds read in golang.org/x/text/language leads to DoS\n\n5. Description:\n\nThe kernel-rt packages provide the Real Time Linux Kernel, which enables\nfine-tuning for systems with extremely high determinism requirements. \n\nBug Fix(es):\n\n* update RT source tree to the RHEL-8.4.z12 source tree (BZ#2119160)\n\n* using __this_cpu_add() in preemptible [00000000] - caller is\n__mod_memcg_lruvec_state+0x69/0x1c0 [None8.4.0.z] (BZ#2124454)\n\n4. In addition this updates provides\nmitigations for the \"Retbleed\" speculative execution attack and the\n\"MMIO stale data\" vulnerabilities. \n\nFor additional information please refer to the following pages:\nhttps://xenbits.xen.org/xsa/advisory-404.html\nhttps://xenbits.xen.org/xsa/advisory-407.html\n\nFor the stable distribution (bullseye), these problems have been fixed in\nversion 4.14.5+24-g87d90d511c-1. \n\nWe recommend that you upgrade your xen packages. \n\nFor the detailed security status of xen please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/xen\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\n\niQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmLRp7MACgkQEMKTtsN8\nTjbUmQ/+PCIyYjQJgGT14YBFpKnI/JjdBNRUAlSMK7k3fPhk+J8sQrRx5MqwxRm3\npoejebvnbn2KS1Z/NVaiPnS40ryOOUnLBKVDAHqRvnvrc2GwEblGCmUVaBn+cn4M\n2OCG2wfpgSDk4sk83obDY1qcQW/676eGY47ULwkG9C+n6wNC8FParq71sCA6UQqy\nXSWlU7o7pc17l8B1c2yTzfdDeXjSaXe9pavxNXDrowLi7taeTn5GwzhH4x1fPWrs\nrGHCY8+Kk8Vq8jEIYmZA7bvKuIFcWkcdQpxcAtbgUvtCRzaid19tcf9McvltivKe\nHaHQhkDJxg32DHcefXMNsh+F0pgXoodh97PdqWtjs49jAkaNZb37Eyn4n7Qt4APm\n4oKAT+QA5wYmfDsBzgAczzV9zgY3/nRvYKNH6q9VMOFE3gZfzdzvyHzpegf2VVtf\n7DuJKTi61tlt6aSzcDHlzdUAwW7sHXKFLRxgQu6tFD7NbEHzgj0iBlcFOnKDwa2s\nhHOE6Hlj1GXZUKjol5pRjnM33qGMJmRhnq45qqWaGe21r+EFw2HTAyCacJciPX+a\nQZ4LEy5+zmc8LFBcZq9kZAVkc91EtTiTPjffqHaVd4eAZvxtgCbqdXFdyRZa9ZRD\n+2+e1dRoiIF6L5PotQygXyKwvxU8ca6Ni9isvit3brbLjcGjhZk=\n=pXvE\n-----END PGP SIGNATURE-----\n. \n\nSecurity Fix(es):\n\n* off-path attacker may inject data or terminate victim\u0027s TCP session\n(CVE-2020-36516)\n\n* use-after-free vulnerability in function sco_sock_sendmsg()\n(CVE-2021-3640)\n\n* smb2_ioctl_query_info NULL pointer dereference (CVE-2022-0168)\n\n* NULL pointer dereference in udf_expand_file_adinicbdue() during writeback\n(CVE-2022-0617)\n\n* swiotlb information leak with DMA_FROM_DEVICE (CVE-2022-0854)\n\n* uninitialized registers on stack in nft_do_chain can cause kernel pointer\nleakage to UM (CVE-2022-1016)\n\n* race condition in snd_pcm_hw_free leading to use-after-free\n(CVE-2022-1048)\n\n* use-after-free and memory errors in ext4 when mounting and operating on a\ncorrupted image (CVE-2022-1184)\n\n* concurrency use-after-free between drm_setmaster_ioctl and\ndrm_mode_getresources (CVE-2022-1280)\n\n* kernel info leak issue in pfkey_register (CVE-2022-1353)\n\n* use-after-free in ath9k_htc_probe_device() could cause an escalation of\nprivileges (CVE-2022-1679)\n\n* NULL pointer dereference in x86_emulate_insn may lead to DoS\n(CVE-2022-1852)\n\n* fanotify misuses fd_install() which could lead to use-after-free\n(CVE-2022-1998)\n\n* nf_tables cross-table potential use-after-free may lead to local\nprivilege escalation (CVE-2022-2586)\n\n* integer underflow leads to out-of-bounds write in reserve_sfa_size()\n(CVE-2022-2639)\n\n* slab-out-of-bounds access in packet_recvmsg() (CVE-2022-20368)\n\n* incomplete clean-up of multi-core shared buffers (aka SBDR)\n(CVE-2022-21123)\n\n* incomplete clean-up of microarchitectural fill buffers (aka SBDS)\n(CVE-2022-21125)\n\n* incomplete clean-up in specific special register write operations (aka\nDRPW) (CVE-2022-21166)\n\n* possible to use the debugger to write zero into a location of choice\n(CVE-2022-21499)\n\n* AMD: RetBleed Arbitrary Speculative Code Execution with Return\nInstructions (CVE-2022-23816, CVE-2022-29900)\n\n* AMD: Branch Type Confusion (non-retbleed) (CVE-2022-23825)\n\n* Intel: Post-barrier Return Stack Buffer Predictions (CVE-2022-26373)\n\n* double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c\n(CVE-2022-28390)\n\n* use after free in SUNRPC subsystem (CVE-2022-28893)\n\n* use-after-free due to improper update of reference count in\nnet/sched/cls_u32.c (CVE-2022-29581)\n\n* Intel: RetBleed Arbitrary Speculative Code Execution with Return\nInstructions (CVE-2022-29901)\n\n* DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c (CVE-2022-36946)\n\n* nf_tables disallow binding to already bound chain (CVE-2022-39190)\n\n* nfs_atomic_open() returns uninitialized data instead of ENOTDIR\n(CVE-2022-24448)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat\nEnterprise Linux 9.1 Release Notes linked from the References section. Bugs fixed (https://bugzilla.redhat.com/):\n\n1905809 - [RHEL-9] WARNING: CPU: 0 PID: 13059 at fs/nfsd/nfs4proc.c:458 nfsd4_open+0x19c/0x4a0 [nfsd]\n1951971 - [RFE] Bonding: add option ns_ipv6_target\n1952053 - [RFE] Bonding: add link_watch.missed_max\n1980646 - CVE-2021-3640 kernel: use-after-free vulnerability in function sco_sock_sendmsg()\n2006399 - limited reexport support kernel documentation\n2009423 - fs: dlm: dlm_callback_resume is too noisy\n2025985 - Add acer_wireless.ko kernel module\n2028370 - [xfstests/nfs generic/476] test never finishes\n2037386 - CVE-2022-0168 kernel: smb2_ioctl_query_info NULL pointer dereference\n2038794 - Backport futex_waitv() from Linux 5.16\n2046624 - [Marvell 9.1 FEAT] update qedi driver to latest upstream\n2051444 - CVE-2022-24448 kernel: nfs_atomic_open() returns uninitialized data instead of ENOTDIR\n2052312 - CVE-2022-1998 kernel: fanotify misuses fd_install() which could lead to use-after-free\n2053632 - CVE-2022-0617 kernel: NULL pointer dereference in udf_expand_file_adinicbdue() during writeback\n2053991 - kernel build fails if CONFIG_RHEL_DIFFERENCES is \"not set\"\n2054023 - vrf test fail in kselftest net:fcnal-test.sh\n2058395 - CVE-2022-0854 kernel: swiotlb information leak with DMA_FROM_DEVICE\n2059928 - CVE-2020-36516 kernel: off-path attacker may inject data or terminate victim\u0027s TCP session\n2066297 - block layer: update to v5.17\n2066614 - CVE-2022-1016 kernel: uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM\n2066706 - CVE-2022-1048 kernel: race condition in snd_pcm_hw_free leading to use-after-free\n2066819 - CVE-2022-1353 kernel: kernel info leak issue in pfkey_register\n2070205 - CVE-2022-1184 kernel: use-after-free and memory errors in ext4 when mounting and operating on a corrupted image\n2071022 - CVE-2022-1280 kernel: concurrency use-after-free between drm_setmaster_ioctl and drm_mode_getresources\n2073064 - CVE-2022-28390 kernel: double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c\n2074208 - CVE-2022-28893 kernel: use after free in SUNRPC subsystem\n2074315 - genirq/affinity: Consider that CPUs on nodes can be unbalanced\n2076304 - VFIO refresh to v5.18\n2083580 - RFE: backport minor fixes and cleanups from upstream (up to version 5.18-rc5)\n2084125 - CVE-2022-1679 kernel: use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges\n2084183 - CVE-2022-21499 kernel: possible to use the debugger to write zero into a location of choice\n2084479 - CVE-2022-2639 kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()\n2088021 - CVE-2022-29581 kernel: use-after-free due to improper update of reference count in net/sched/cls_u32.c\n2089815 - CVE-2022-1852 kernel: NULL pointer dereference in x86_emulate_insn may lead to DoS\n2090226 - CVE-2022-23816 CVE-2022-29900 hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions\n2090237 - CVE-2022-21123 hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR)\n2090240 - CVE-2022-21125 hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS)\n2090241 - CVE-2022-21166 hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW)\n2094045 - mm: Fix stall observed when xfs calls alloc_pages_bulk_array()\n2095275 - [RHEL-9] NFS - Fix \"softreval\" mount option\n2100261 - backport audit iouring fix and audit_log_kern_module memleak fix from v5.18 and v5.19-rc3\n2102319 - ipmitool sensor list command generates syslog errors on HP iLO 5\n2103148 - CVE-2022-29901 hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions\n2103153 - CVE-2022-23825 hw: cpu: AMD: Branch Type Confusion (non-retbleed)\n2107360 - knfsd not always recalling delegations on contended access\n2107589 - backport vsock commits for RHEL-9.1\n2109349 - [bonding] bugfix update from v5.19\n2110576 - RHEL-9 nfsd server post_wcc fixes - clients see increased revalidations\n2111270 - netfilter: rebase conntrack to 5.19\n2114878 - CVE-2022-2586 kernel: nf_tables cross-table potential use-after-free may lead to local privilege escalation\n2115065 - CVE-2022-26373 hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions\n2115278 - CVE-2022-36946 kernel: DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c\n2123695 - CVE-2022-20368 kernel: net/packet: slab-out-of-bounds access in packet_recvmsg()\n2129152 - CVE-2022-39190 kernel: nf_tables disallow binding to already bound chain\n\n6. Bugs fixed (https://bugzilla.redhat.com/):\n\n1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation\n2024946 - Ingress Canary does not respect router sharding on default IngressController\n2104825 - Installer creates unnecessary master_ingress_cluster_policy_controller security group rule\n2108214 - Route status isn\u0027t always getting cleared with routeSelector updates\n2108595 - etcd Dashboard should be removed on guest cluster of hypershift\n2109193 - Power VS machine Processor is always defaulted to 0.5\n2109887 - [UI] MultiClusterHub details after it\u0027s creation starts flickers, disappears and appears back (happened twice)\n2110528 - Route status isn\u0027t always getting cleared with routeSelector updates\n2111345 - should use the same value for AlertRelabelConfig with oc explain\n2117424 - Backport: https://github.com/openshift/kubernetes/pull/1295\n\n5. JIRA issues fixed (https://issues.jboss.org/):\n\nOCPBUGS-1007 - CVE-2021-3121 telemeter-container: [1924548] telemeter-container: gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation [openshift-4]\nOCPBUGS-1070 - Update ODC owners\nOCPBUGS-1104 - package-server-manager does not migrate packageserver CSV from v0.17.0 to v0.18.3 on OCP 4.8 -\u003e 4.9 upgrade\nOCPBUGS-1145 - Bug 2085336 - [IPI-Azure] Fail to create the worker node which HyperVGenerations is V2 or V1 and vmNetworkingType is Accelerated\nOCPBUGS-1233 - [IPI] nodelink controller is not able to reconcile and match nodes and machines with logical interfaces defined by nmstate at baremetalhost creation\nOCPBUGS-1261 - Backport: https://github.com/openshift/kubernetes/pull/1295\nOCPBUGS-393 - Setting disableNetworkDiagnostics: true does not persist when network-operator pod gets re-created\nOCPBUGS-455 - [vsphere] update install-config description for diskType\nOCPBUGS-524 - Plugin page error boundary message is not cleared after leaving page\nOCPBUGS-668 - Prefer local dns does not work expectedly on OCPv4.11\nOCPBUGS-744 - [4.11] Spoke BMH stuck ?provisioning? after changing a BIOS attribute via the converged workflow\nOCPBUGS-746 - [4.11] Supermicro server FirmwareSchema CR does not contain allowable_values, attribute_type and read_only flag\nOCPBUGS-747 - [4.11] Disconnected IPI OCP cluster install on baremetal fails when hostname of master nodes does not include the text \"master\n\n6. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 202208-23\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: High\n Title: Xen: Multiple Vulnerabilities\n Date: August 14, 2022\n Bugs: #810341, #812485, #816882, #825354, #832039, #835401, #850802\n ID: 202208-23\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n=======\nMultiple vulnerabilities have been discovered in Xen, the worst of which\ncould result in remote code execution (guest sandbox escape). \n\nBackground\n=========\nXen is a bare-metal hypervisor. \n\nAffected packages\n================\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 app-emulation/xen \u003c 4.15.3 \u003e= 4.15.3\n 2 app-emulation/xen-tools \u003c 4.15.3 \u003e= 4.15.3\n\nDescription\n==========\nMultiple vulnerabilities have been discovered in Xen. Please review the\nCVE identifiers referenced below for details. \n\nImpact\n=====\nPlease review the referenced CVE identifiers for details. \n\nWorkaround\n=========\nThere is no known workaround at this time. \n\nResolution\n=========\nAll Xen users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=app-emulation/xen-4.15.3\"\n\nAll Xen tools users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=app-emulation/xen-tools-4.15.3\"\n\nReferences\n=========\n[ 1 ] CVE-2021-28694\n https://nvd.nist.gov/vuln/detail/CVE-2021-28694\n[ 2 ] CVE-2021-28695\n https://nvd.nist.gov/vuln/detail/CVE-2021-28695\n[ 3 ] CVE-2021-28696\n https://nvd.nist.gov/vuln/detail/CVE-2021-28696\n[ 4 ] CVE-2021-28697\n https://nvd.nist.gov/vuln/detail/CVE-2021-28697\n[ 5 ] CVE-2021-28698\n https://nvd.nist.gov/vuln/detail/CVE-2021-28698\n[ 6 ] CVE-2021-28699\n https://nvd.nist.gov/vuln/detail/CVE-2021-28699\n[ 7 ] CVE-2021-28700\n https://nvd.nist.gov/vuln/detail/CVE-2021-28700\n[ 8 ] CVE-2021-28701\n https://nvd.nist.gov/vuln/detail/CVE-2021-28701\n[ 9 ] CVE-2021-28702\n https://nvd.nist.gov/vuln/detail/CVE-2021-28702\n[ 10 ] CVE-2021-28710\n https://nvd.nist.gov/vuln/detail/CVE-2021-28710\n[ 11 ] CVE-2022-21123\n https://nvd.nist.gov/vuln/detail/CVE-2022-21123\n[ 12 ] CVE-2022-21125\n https://nvd.nist.gov/vuln/detail/CVE-2022-21125\n[ 13 ] CVE-2022-21166\n https://nvd.nist.gov/vuln/detail/CVE-2022-21166\n[ 14 ] CVE-2022-23033\n https://nvd.nist.gov/vuln/detail/CVE-2022-23033\n[ 15 ] CVE-2022-23034\n https://nvd.nist.gov/vuln/detail/CVE-2022-23034\n[ 16 ] CVE-2022-23035\n https://nvd.nist.gov/vuln/detail/CVE-2022-23035\n[ 17 ] CVE-2022-26362\n https://nvd.nist.gov/vuln/detail/CVE-2022-26362\n[ 18 ] CVE-2022-26363\n https://nvd.nist.gov/vuln/detail/CVE-2022-26363\n[ 19 ] CVE-2022-26364\n https://nvd.nist.gov/vuln/detail/CVE-2022-26364\n[ 20 ] XSA-378\n[ 21 ] XSA-379\n[ 22 ] XSA-380\n[ 23 ] XSA-382\n[ 24 ] XSA-383\n[ 25 ] XSA-384\n[ 26 ] XSA-386\n[ 27 ] XSA-390\n[ 28 ] XSA-401\n[ 29 ] XSA-402\n[ 30 ] XSA-404\n\nAvailability\n===========\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/202208-23\n\nConcerns?\n========\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n======\nCopyright 2022 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttps://creativecommons.org/licenses/by-sa/2.5\n. Bugs fixed (https://bugzilla.redhat.com/):\n\n2107342 - CVE-2022-30631 golang: compress/gzip: stack exhaustion in Reader.Read\n\n5. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Moderate: kernel security, bug fix, and enhancement update\nAdvisory ID: RHSA-2022:6460-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2022:6460\nIssue date: 2022-09-13\nCVE Names: CVE-2022-21123 CVE-2022-21125 CVE-2022-21166 \n=====================================================================\n\n1. Summary:\n\nAn update for kernel is now available for Red Hat Enterprise Linux 8. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat CodeReady Linux Builder (v. 8) - aarch64, ppc64le, x86_64\nRed Hat Enterprise Linux BaseOS (v. 8) - aarch64, noarch, ppc64le, s390x, x86_64\n\n3. Description:\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system. \n\nBug Fix(es):\n\n* Bad page state in process qemu-kvm pfn:68a74600 (BZ#2081013)\n\n* slub corruption during LPM of hnv interface (BZ#2081250)\n\n* Affinity broken due to vector space exhaustion (BZ#2084646)\n\n* \u0027rmmod pmt_telemetry\u0027 panics on ADL-P IOTG (BZ#2091079)\n\n* Unable to boot RHEL-8.6 on Brazos max. config (Install is success)\n(BZ#2092241)\n\n* kernel crash after reboot of T14/G2 AMD laptop (mt7921e module)\n(BZ#2095654)\n\n* mt7921: free resources on pci_probe error path (BZ#2101684)\n\n* NLM should be more defensive if underlying FS changes fl_owner\n(BZ#2102099)\n\n* RHEL8/async-pf Guest call trace when reboot after postcopy migration with\nhigh stress workload (BZ#2105340)\n\n* execve exit tracepoint not called (BZ#2106662)\n\n* QProcess dead lock on kernel-4.18.0-358 (BZ#2107643)\n\n* KVM fix guest FPU uABI size to kvm_xsave (BZ#2107652)\n\n* KVM selftests fail to compile (BZ#2107655)\n\n* Some monitor have no display with AMD W6400 when boot into OS. \n(BZ#2109826)\n\n* Percpu counter usage is gradually getting increasing during podman\ncontainer recreation. (BZ#2110039)\n\n* multipath failed to recover after EEH hit on flavafish adapter on\nDenali(qla2xxx/flavafish/RHEL8.6/Denali) (BZ#2110768)\n\n* soft lockups under heavy I/O load to ahci connected SSDs (BZ#2110772)\n\n* trouble re-assigning MACs to VFs, ice stricter than other drivers\n(BZ#2111936)\n\n* Intel MPI 2019.0 - mpirun stuck on latest kernel (BZ#2112030)\n\n* Multicast packets are not received by all VFs on the same port even\nthough they have the same VLAN (BZ#2117026)\n\n* Hyper-V 2019 Dynamic Memory Problem hv_balloon (BZ#2117050)\n\n* kernel BUG at kernel/sched/deadline.c:1561! (BZ#2117410)\n\n* ALSA (sound) driver - update Intel SOF kcontrol code (BZ#2117732)\n\n* bridge over bond over ice ports has no connection (BZ#2118580)\n\n* Fix max VLANs available for VF (BZ#2118581)\n\n* offline selftest failed (BZ#2118582)\n\n* INTEL NVMUpdate utility ver 3.20 is failing to update firmware on\nE810-XXVDA4T (WPC) (BZ#2118583)\n\n* VM configured with failover interface will coredump after been migrating\nfrom source host to target host(only iavf driver) (BZ#2118705)\n\n* Fix max VLANs available for untrusted VF (BZ#2118707)\n\n* Softlockup on infinite loop in task_get_css() for a CSS_DYING cpuset\n(BZ#2120776)\n\nEnhancement(s):\n\n* KVM Sapphire Rapids (SPR) AMX Instructions (BZ#2088287)\n\n* KVM Sapphire Rapids (SPR) AMX Instructions part2 (BZ#2088288)\n\n* ice: Driver Update (BZ#2102359)\n\n* iavf: Driver Update (BZ#2102360)\n\n* iommu/vt-d: Make DMAR_UNITS_SUPPORTED a config setting (BZ#2112983)\n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n2090237 - CVE-2022-21123 hw: cpu: Incomplete cleanup of multi-core shared buffers (aka SBDR)\n2090240 - CVE-2022-21125 hw: cpu: Incomplete cleanup of microarchitectural fill buffers (aka SBDS)\n2090241 - CVE-2022-21166 hw: cpu: Incomplete cleanup in specific special register write operations (aka DRPW)\n\n6. Package List:\n\nRed Hat Enterprise Linux BaseOS (v. 8):\n\nSource:\nkernel-4.18.0-372.26.1.el8_6.src.rpm\n\naarch64:\nbpftool-4.18.0-372.26.1.el8_6.aarch64.rpm\nbpftool-debuginfo-4.18.0-372.26.1.el8_6.aarch64.rpm\nkernel-4.18.0-372.26.1.el8_6.aarch64.rpm\nkernel-core-4.18.0-372.26.1.el8_6.aarch64.rpm\nkernel-cross-headers-4.18.0-372.26.1.el8_6.aarch64.rpm\nkernel-debug-4.18.0-372.26.1.el8_6.aarch64.rpm\nkernel-debug-core-4.18.0-372.26.1.el8_6.aarch64.rpm\nkernel-debug-debuginfo-4.18.0-372.26.1.el8_6.aarch64.rpm\nkernel-debug-devel-4.18.0-372.26.1.el8_6.aarch64.rpm\nkernel-debug-modules-4.18.0-372.26.1.el8_6.aarch64.rpm\nkernel-debug-modules-extra-4.18.0-372.26.1.el8_6.aarch64.rpm\nkernel-debuginfo-4.18.0-372.26.1.el8_6.aarch64.rpm\nkernel-debuginfo-common-aarch64-4.18.0-372.26.1.el8_6.aarch64.rpm\nkernel-devel-4.18.0-372.26.1.el8_6.aarch64.rpm\nkernel-headers-4.18.0-372.26.1.el8_6.aarch64.rpm\nkernel-modules-4.18.0-372.26.1.el8_6.aarch64.rpm\nkernel-modules-extra-4.18.0-372.26.1.el8_6.aarch64.rpm\nkernel-tools-4.18.0-372.26.1.el8_6.aarch64.rpm\nkernel-tools-debuginfo-4.18.0-372.26.1.el8_6.aarch64.rpm\nkernel-tools-libs-4.18.0-372.26.1.el8_6.aarch64.rpm\nperf-4.18.0-372.26.1.el8_6.aarch64.rpm\nperf-debuginfo-4.18.0-372.26.1.el8_6.aarch64.rpm\npython3-perf-4.18.0-372.26.1.el8_6.aarch64.rpm\npython3-perf-debuginfo-4.18.0-372.26.1.el8_6.aarch64.rpm\n\nnoarch:\nkernel-abi-stablelists-4.18.0-372.26.1.el8_6.noarch.rpm\nkernel-doc-4.18.0-372.26.1.el8_6.noarch.rpm\n\nppc64le:\nbpftool-4.18.0-372.26.1.el8_6.ppc64le.rpm\nbpftool-debuginfo-4.18.0-372.26.1.el8_6.ppc64le.rpm\nkernel-4.18.0-372.26.1.el8_6.ppc64le.rpm\nkernel-core-4.18.0-372.26.1.el8_6.ppc64le.rpm\nkernel-cross-headers-4.18.0-372.26.1.el8_6.ppc64le.rpm\nkernel-debug-4.18.0-372.26.1.el8_6.ppc64le.rpm\nkernel-debug-core-4.18.0-372.26.1.el8_6.ppc64le.rpm\nkernel-debug-debuginfo-4.18.0-372.26.1.el8_6.ppc64le.rpm\nkernel-debug-devel-4.18.0-372.26.1.el8_6.ppc64le.rpm\nkernel-debug-modules-4.18.0-372.26.1.el8_6.ppc64le.rpm\nkernel-debug-modules-extra-4.18.0-372.26.1.el8_6.ppc64le.rpm\nkernel-debuginfo-4.18.0-372.26.1.el8_6.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-4.18.0-372.26.1.el8_6.ppc64le.rpm\nkernel-devel-4.18.0-372.26.1.el8_6.ppc64le.rpm\nkernel-headers-4.18.0-372.26.1.el8_6.ppc64le.rpm\nkernel-modules-4.18.0-372.26.1.el8_6.ppc64le.rpm\nkernel-modules-extra-4.18.0-372.26.1.el8_6.ppc64le.rpm\nkernel-tools-4.18.0-372.26.1.el8_6.ppc64le.rpm\nkernel-tools-debuginfo-4.18.0-372.26.1.el8_6.ppc64le.rpm\nkernel-tools-libs-4.18.0-372.26.1.el8_6.ppc64le.rpm\nperf-4.18.0-372.26.1.el8_6.ppc64le.rpm\nperf-debuginfo-4.18.0-372.26.1.el8_6.ppc64le.rpm\npython3-perf-4.18.0-372.26.1.el8_6.ppc64le.rpm\npython3-perf-debuginfo-4.18.0-372.26.1.el8_6.ppc64le.rpm\n\ns390x:\nbpftool-4.18.0-372.26.1.el8_6.s390x.rpm\nbpftool-debuginfo-4.18.0-372.26.1.el8_6.s390x.rpm\nkernel-4.18.0-372.26.1.el8_6.s390x.rpm\nkernel-core-4.18.0-372.26.1.el8_6.s390x.rpm\nkernel-cross-headers-4.18.0-372.26.1.el8_6.s390x.rpm\nkernel-debug-4.18.0-372.26.1.el8_6.s390x.rpm\nkernel-debug-core-4.18.0-372.26.1.el8_6.s390x.rpm\nkernel-debug-debuginfo-4.18.0-372.26.1.el8_6.s390x.rpm\nkernel-debug-devel-4.18.0-372.26.1.el8_6.s390x.rpm\nkernel-debug-modules-4.18.0-372.26.1.el8_6.s390x.rpm\nkernel-debug-modules-extra-4.18.0-372.26.1.el8_6.s390x.rpm\nkernel-debuginfo-4.18.0-372.26.1.el8_6.s390x.rpm\nkernel-debuginfo-common-s390x-4.18.0-372.26.1.el8_6.s390x.rpm\nkernel-devel-4.18.0-372.26.1.el8_6.s390x.rpm\nkernel-headers-4.18.0-372.26.1.el8_6.s390x.rpm\nkernel-modules-4.18.0-372.26.1.el8_6.s390x.rpm\nkernel-modules-extra-4.18.0-372.26.1.el8_6.s390x.rpm\nkernel-tools-4.18.0-372.26.1.el8_6.s390x.rpm\nkernel-tools-debuginfo-4.18.0-372.26.1.el8_6.s390x.rpm\nkernel-zfcpdump-4.18.0-372.26.1.el8_6.s390x.rpm\nkernel-zfcpdump-core-4.18.0-372.26.1.el8_6.s390x.rpm\nkernel-zfcpdump-debuginfo-4.18.0-372.26.1.el8_6.s390x.rpm\nkernel-zfcpdump-devel-4.18.0-372.26.1.el8_6.s390x.rpm\nkernel-zfcpdump-modules-4.18.0-372.26.1.el8_6.s390x.rpm\nkernel-zfcpdump-modules-extra-4.18.0-372.26.1.el8_6.s390x.rpm\nperf-4.18.0-372.26.1.el8_6.s390x.rpm\nperf-debuginfo-4.18.0-372.26.1.el8_6.s390x.rpm\npython3-perf-4.18.0-372.26.1.el8_6.s390x.rpm\npython3-perf-debuginfo-4.18.0-372.26.1.el8_6.s390x.rpm\n\nx86_64:\nbpftool-4.18.0-372.26.1.el8_6.x86_64.rpm\nbpftool-debuginfo-4.18.0-372.26.1.el8_6.x86_64.rpm\nkernel-4.18.0-372.26.1.el8_6.x86_64.rpm\nkernel-core-4.18.0-372.26.1.el8_6.x86_64.rpm\nkernel-cross-headers-4.18.0-372.26.1.el8_6.x86_64.rpm\nkernel-debug-4.18.0-372.26.1.el8_6.x86_64.rpm\nkernel-debug-core-4.18.0-372.26.1.el8_6.x86_64.rpm\nkernel-debug-debuginfo-4.18.0-372.26.1.el8_6.x86_64.rpm\nkernel-debug-devel-4.18.0-372.26.1.el8_6.x86_64.rpm\nkernel-debug-modules-4.18.0-372.26.1.el8_6.x86_64.rpm\nkernel-debug-modules-extra-4.18.0-372.26.1.el8_6.x86_64.rpm\nkernel-debuginfo-4.18.0-372.26.1.el8_6.x86_64.rpm\nkernel-debuginfo-common-x86_64-4.18.0-372.26.1.el8_6.x86_64.rpm\nkernel-devel-4.18.0-372.26.1.el8_6.x86_64.rpm\nkernel-headers-4.18.0-372.26.1.el8_6.x86_64.rpm\nkernel-modules-4.18.0-372.26.1.el8_6.x86_64.rpm\nkernel-modules-extra-4.18.0-372.26.1.el8_6.x86_64.rpm\nkernel-tools-4.18.0-372.26.1.el8_6.x86_64.rpm\nkernel-tools-debuginfo-4.18.0-372.26.1.el8_6.x86_64.rpm\nkernel-tools-libs-4.18.0-372.26.1.el8_6.x86_64.rpm\nperf-4.18.0-372.26.1.el8_6.x86_64.rpm\nperf-debuginfo-4.18.0-372.26.1.el8_6.x86_64.rpm\npython3-perf-4.18.0-372.26.1.el8_6.x86_64.rpm\npython3-perf-debuginfo-4.18.0-372.26.1.el8_6.x86_64.rpm\n\nRed Hat CodeReady Linux Builder (v. 8):\n\naarch64:\nbpftool-debuginfo-4.18.0-372.26.1.el8_6.aarch64.rpm\nkernel-debug-debuginfo-4.18.0-372.26.1.el8_6.aarch64.rpm\nkernel-debuginfo-4.18.0-372.26.1.el8_6.aarch64.rpm\nkernel-debuginfo-common-aarch64-4.18.0-372.26.1.el8_6.aarch64.rpm\nkernel-tools-debuginfo-4.18.0-372.26.1.el8_6.aarch64.rpm\nkernel-tools-libs-devel-4.18.0-372.26.1.el8_6.aarch64.rpm\nperf-debuginfo-4.18.0-372.26.1.el8_6.aarch64.rpm\npython3-perf-debuginfo-4.18.0-372.26.1.el8_6.aarch64.rpm\n\nppc64le:\nbpftool-debuginfo-4.18.0-372.26.1.el8_6.ppc64le.rpm\nkernel-debug-debuginfo-4.18.0-372.26.1.el8_6.ppc64le.rpm\nkernel-debuginfo-4.18.0-372.26.1.el8_6.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-4.18.0-372.26.1.el8_6.ppc64le.rpm\nkernel-tools-debuginfo-4.18.0-372.26.1.el8_6.ppc64le.rpm\nkernel-tools-libs-devel-4.18.0-372.26.1.el8_6.ppc64le.rpm\nperf-debuginfo-4.18.0-372.26.1.el8_6.ppc64le.rpm\npython3-perf-debuginfo-4.18.0-372.26.1.el8_6.ppc64le.rpm\n\nx86_64:\nbpftool-debuginfo-4.18.0-372.26.1.el8_6.x86_64.rpm\nkernel-debug-debuginfo-4.18.0-372.26.1.el8_6.x86_64.rpm\nkernel-debuginfo-4.18.0-372.26.1.el8_6.x86_64.rpm\nkernel-debuginfo-common-x86_64-4.18.0-372.26.1.el8_6.x86_64.rpm\nkernel-tools-debuginfo-4.18.0-372.26.1.el8_6.x86_64.rpm\nkernel-tools-libs-devel-4.18.0-372.26.1.el8_6.x86_64.rpm\nperf-debuginfo-4.18.0-372.26.1.el8_6.x86_64.rpm\npython3-perf-debuginfo-4.18.0-372.26.1.el8_6.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2022-21123\nhttps://access.redhat.com/security/cve/CVE-2022-21125\nhttps://access.redhat.com/security/cve/CVE-2022-21166\nhttps://access.redhat.com/security/updates/classification/#moderate\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2022 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\na685GRAjoyY=\n=4AwP\n-----END PGP SIGNATURE-----\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n. Description:\n\nRed Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments. \n\nThis advisory contains the container images for Red Hat OpenShift Container\nPlatform 4.8.53. See the following advisory for the RPM packages for this\nrelease:\n\nhttps://access.redhat.com/errata/RHBA-2022:7873\n\nSpace precludes documenting all of the container images in this advisory. Solution:\n\nFor OpenShift Container Platform 4.8 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html\n\nYou may download the oc tool and use it to inspect release image metadata\nfor x86_64, s390x, and ppc64le architectures. The image digests\nmay be found at\nhttps://quay.io/repository/openshift-release-dev/ocp-release?tab=tags\n\nThe sha values for the release are:\n\n(For x86_64 architecture)\nThe image digest is\nsha256:ac2bbfa7036c64bbdb44f9a74df3dbafcff1b851d812bf2a48c4fabcac3c7a53\n\n(For s390x architecture)\nThe image digest is\nsha256:ac2c74a664257cea299126d4f789cdf9a5a4efc4a4e8c2361b943374d4eb21e4\n\n(For ppc64le architecture)\nThe image digest is\nsha256:53adc42ed30ad39d7117837dbf5a6db6943a8f0b3b61bc0d046b83394f5c28b2\n\nAll OpenShift Container Platform 4.8 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html\n\n4. Bugs fixed (https://bugzilla.redhat.com/):\n\n2077100 - Console backend check for Web Terminal Operator incorrectly returns HTTP 204\n2092918 - CVE-2022-30321 go-getter: unsafe download (issue 1 of 3)\n2092923 - CVE-2022-30322 go-getter: unsafe download (issue 2 of 3)\n2092925 - CVE-2022-30323 go-getter: unsafe download (issue 3 of 3)\n2092928 - CVE-2022-26945 go-getter: command injection vulnerability\n\n5. JIRA issues fixed (https://issues.jboss.org/):\n\nOCPBUGS-2205 - Prefer local dns does not work expectedly on OCPv4.8\nOCPBUGS-2347 - [cluster-api-provider-baremetal] fix 4.8 build\nOCPBUGS-2577 - [4.8] ETCD Operator goes degraded when a second internal node ip is added\nOCPBUGS-2773 - e2e tests: Installs Red Hat Integration - 3scale operator test is failing due to change of Operator name\nOCPBUGS-2989 - [4.8] cri-o should report the stage of container and pod creation it\u0027s stuck at\n\n6",
"sources": [
{
"db": "NVD",
"id": "CVE-2022-21123"
},
{
"db": "VULHUB",
"id": "VHN-406835"
},
{
"db": "VULMON",
"id": "CVE-2022-21123"
},
{
"db": "PACKETSTORM",
"id": "168426"
},
{
"db": "PACKETSTORM",
"id": "169411"
},
{
"db": "PACKETSTORM",
"id": "169304"
},
{
"db": "PACKETSTORM",
"id": "169884"
},
{
"db": "PACKETSTORM",
"id": "168461"
},
{
"db": "PACKETSTORM",
"id": "168076"
},
{
"db": "PACKETSTORM",
"id": "168503"
},
{
"db": "PACKETSTORM",
"id": "168355"
},
{
"db": "PACKETSTORM",
"id": "169941"
}
],
"trust": 1.89
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2022-21123",
"trust": 2.1
},
{
"db": "OPENWALL",
"id": "OSS-SECURITY/2022/06/16/1",
"trust": 1.2
},
{
"db": "PACKETSTORM",
"id": "168503",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "168076",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "169941",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "168461",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "168355",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "167785",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "169719",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "169688",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "168294",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "169690",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "168021",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "168018",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "168538",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "169695",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "169997",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "167714",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "168694",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "167862",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "167549",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "168364",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "167692",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "167545",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "170226",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "167746",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-406835",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2022-21123",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "168426",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "169411",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "169304",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "169884",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-406835"
},
{
"db": "VULMON",
"id": "CVE-2022-21123"
},
{
"db": "PACKETSTORM",
"id": "168426"
},
{
"db": "PACKETSTORM",
"id": "169411"
},
{
"db": "PACKETSTORM",
"id": "169304"
},
{
"db": "PACKETSTORM",
"id": "169884"
},
{
"db": "PACKETSTORM",
"id": "168461"
},
{
"db": "PACKETSTORM",
"id": "168076"
},
{
"db": "PACKETSTORM",
"id": "168503"
},
{
"db": "PACKETSTORM",
"id": "168355"
},
{
"db": "PACKETSTORM",
"id": "169941"
},
{
"db": "NVD",
"id": "CVE-2022-21123"
}
]
},
"id": "VAR-202206-1106",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-406835"
}
],
"trust": 0.01
},
"last_update_date": "2026-04-10T22:23:32.258000Z",
"patch": {
"_id": null,
"data": [
{
"title": "Red Hat: ",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2022-21123"
},
{
"title": "Ubuntu Security Notice: USN-5485-1: Linux kernel vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-5485-1"
},
{
"title": "Ubuntu Security Notice: USN-5485-2: Linux kernel (OEM) vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-5485-2"
},
{
"title": "Red Hat: Moderate: kernel-rt security and bug fix update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20225939 - Security Advisory"
},
{
"title": "Red Hat: Moderate: kernel security, bug fix, and enhancement update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20226460 - Security Advisory"
},
{
"title": "Red Hat: Moderate: kernel-rt security and bug fix update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20226437 - Security Advisory"
},
{
"title": "Red Hat: Moderate: kernel security and bug fix update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20225937 - Security Advisory"
},
{
"title": "Red Hat: Important: kernel-rt security and bug fix update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20227280 - Security Advisory"
},
{
"title": "Red Hat: Important: kernel security update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20226872 - Security Advisory"
},
{
"title": "Red Hat: Important: kernel security and bug fix update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20227279 - Security Advisory"
},
{
"title": "Ubuntu Security Notice: USN-5484-1: Linux kernel vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-5484-1"
},
{
"title": "Red Hat: Important: kernel-rt security and bug fix update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20226991 - Security Advisory"
},
{
"title": "Red Hat: Important: kernel security, bug fix, and enhancement update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20226983 - Security Advisory"
},
{
"title": "Debian Security Advisories: DSA-5178-1 intel-microcode -- security update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=1e914c5a2547786f7ee2aba93fa4c45a"
},
{
"title": "Debian CVElist Bug Report Logs: xen: New unreleased upstream fixes for 6 vulnerabilities in testing/unstable",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=5fdc49cb53af49972ab3ac47e5a6b1bd"
},
{
"title": "Red Hat: Moderate: Red Hat Advanced Cluster Management 2.5.3 security fixes and bug fixes",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20226954 - Security Advisory"
},
{
"title": "Red Hat: Moderate: Moderate:OpenShift Container Platform 4.11.5 security and extras update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20226537 - Security Advisory"
},
{
"title": "Red Hat: Moderate: OpenShift Container Platform 4.11.5 bug fix and security update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20226536 - Security Advisory"
},
{
"title": "Red Hat: Moderate: Openshift Logging Bug Fix Release and Security Update (5.3.12)",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20226560 - Security Advisory"
},
{
"title": "Ubuntu Security Notice: USN-5486-1: Intel Microcode vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-5486-1"
},
{
"title": "Red Hat: Important: OpenShift Virtualization 4.9.7 Images security update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20228609 - Security Advisory"
},
{
"title": "Red Hat: Important: kernel-rt security and bug fix update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20228974 - Security Advisory"
},
{
"title": "Red Hat: Important: kernel security and bug fix update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20228973 - Security Advisory"
},
{
"title": "Ubuntu Security Notice: USN-5535-1: Intel Microcode vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-5535-1"
},
{
"title": "Ubuntu Security Notice: USN-5529-1: Linux kernel (OEM) vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-5529-1"
},
{
"title": "Debian Security Advisories: DSA-5184-1 xen -- security update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=37cc577a7d3df607e62854fc340b6435"
},
{
"title": "Red Hat: Moderate: OpenShift Container Platform 3.11.784 security update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20226252 - Security Advisory"
},
{
"title": "Red Hat: Important: OpenShift Container Platform 4.10.39 bug fix and security update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20227211 - Security Advisory"
},
{
"title": "Red Hat: Important: OpenShift Container Platform 4.9.51 bug fix and security update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20227216 - Security Advisory"
},
{
"title": "Red Hat: Important: OpenShift Container Platform 4.8.53 bug fix and security update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20227874 - Security Advisory"
},
{
"title": "Red Hat: Moderate: Red Hat Advanced Cluster Management 2.3.12 security updates and bug fixes",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20226271 - Security Advisory"
},
{
"title": "Ubuntu Security Notice: USN-5513-1: Linux kernel (AWS) vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-5513-1"
},
{
"title": "Ubuntu Security Notice: USN-5505-1: Linux kernel vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-5505-1"
},
{
"title": "Red Hat: Critical: Red Hat Advanced Cluster Management 2.4.6 security update and bug fixes",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20226696 - Security Advisory"
},
{
"title": "Red Hat: Moderate: kernel security, bug fix, and enhancement update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20228267 - Security Advisory"
},
{
"title": "Red Hat: Moderate: kernel-rt security and bug fix update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20227933 - Security Advisory"
},
{
"title": "Debian Security Advisories: DSA-5173-1 linux -- security update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=acd6d70f5129be4a1390575252ec92a6"
},
{
"title": "Hardware attacks / State of the art",
"trust": 0.1,
"url": "https://github.com/codexlynx/hardware-attacks-state-of-the-art "
},
{
"title": "veracode-container-security-finding-parser",
"trust": 0.1,
"url": "https://github.com/vincent-deng/veracode-container-security-finding-parser "
},
{
"title": "CVE-2022-XXXX",
"trust": 0.1,
"url": "https://github.com/AlphabugX/CVE-2022-23305 "
},
{
"title": "CVE-2022-XXXX",
"trust": 0.1,
"url": "https://github.com/AlphabugX/CVE-2022-RCE "
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2022-21123"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-459",
"trust": 1.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-406835"
},
{
"db": "NVD",
"id": "CVE-2022-21123"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 1.3,
"url": "https://security.gentoo.org/glsa/202208-23"
},
{
"trust": 1.2,
"url": "https://security.netapp.com/advisory/ntap-20220624-0008/"
},
{
"trust": 1.2,
"url": "https://www.debian.org/security/2022/dsa-5173"
},
{
"trust": 1.2,
"url": "https://www.debian.org/security/2022/dsa-5178"
},
{
"trust": 1.2,
"url": "https://www.debian.org/security/2022/dsa-5184"
},
{
"trust": 1.2,
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html"
},
{
"trust": 1.2,
"url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html"
},
{
"trust": 1.2,
"url": "http://www.openwall.com/lists/oss-security/2022/06/16/1"
},
{
"trust": 1.1,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/fhtew3rxu2gw6s3rcpqg4vnczgi3tosv/"
},
{
"trust": 1.1,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/t4p2kjyl74kglhe4jzetvw7pzh6ziaba/"
},
{
"trust": 1.1,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/mcvomhbqrh4kp7in6u24cw7f2d2l5kbs/"
},
{
"trust": 1.1,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/rkrxz4lhgcgmog24zcejny6r2bts4s2q/"
},
{
"trust": 0.8,
"url": "https://access.redhat.com/security/cve/cve-2022-21123"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-21166"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-21123"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-21125"
},
{
"trust": 0.7,
"url": "https://access.redhat.com/security/team/contact/"
},
{
"trust": 0.7,
"url": "https://access.redhat.com/security/cve/cve-2022-21166"
},
{
"trust": 0.7,
"url": "https://access.redhat.com/security/cve/cve-2022-21125"
},
{
"trust": 0.7,
"url": "https://bugzilla.redhat.com/):"
},
{
"trust": 0.7,
"url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce"
},
{
"trust": 0.5,
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-0391"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2015-20107"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-34903"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2015-20107"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2022-0391"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2022-34903"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/team/key/"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/articles/11258"
},
{
"trust": 0.2,
"url": "https://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/errata/rhsa-2022:6536"
},
{
"trust": 0.2,
"url": "https://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2021-45486"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-45486"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2021-45485"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-45485"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2022-2588"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-2588"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-26363"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-26364"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-26362"
},
{
"trust": 0.2,
"url": "https://issues.jboss.org/):"
},
{
"trust": 0.1,
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/t4p2kjyl74kglhe4jzetvw7pzh6ziaba/"
},
{
"trust": 0.1,
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/rkrxz4lhgcgmog24zcejny6r2bts4s2q/"
},
{
"trust": 0.1,
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/fhtew3rxu2gw6s3rcpqg4vnczgi3tosv/"
},
{
"trust": 0.1,
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/mcvomhbqrh4kp7in6u24cw7f2d2l5kbs/"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/459.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://ubuntu.com/security/notices/usn-5485-1"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-38561"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-21698"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2022:6537"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-21698"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-38561"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2022:6991"
},
{
"trust": 0.1,
"url": "https://www.debian.org/security/faq"
},
{
"trust": 0.1,
"url": "https://security-tracker.debian.org/tracker/xen"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-23816"
},
{
"trust": 0.1,
"url": "https://www.debian.org/security/"
},
{
"trust": 0.1,
"url": "https://xenbits.xen.org/xsa/advisory-407.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-23825"
},
{
"trust": 0.1,
"url": "https://xenbits.xen.org/xsa/advisory-404.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-29900"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/solutions/6971358"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-1679"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-1852"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-1016"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-0854"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-28893"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-23816"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-3640"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-1016"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-1280"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-1048"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-36516"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-1280"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-2639"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-26373"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-20368"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-1184"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-1353"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-1679"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-1998"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-29901"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2022:8267"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-0617"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-20368"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-24448"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-0168"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-1998"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-21499"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-39190"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-29581"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-0617"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-23825"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-36516"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-28390"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-2586"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-1048"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-1184"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-1353"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-29900"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-0854"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-0168"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-36946"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3640"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-1852"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-28199"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3121"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-3121"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-30629"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2022:6535"
},
{
"trust": 0.1,
"url": "https://github.com/openshift/kubernetes/pull/1295"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-28199"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-30629"
},
{
"trust": 0.1,
"url": "https://bugs.gentoo.org."
},
{
"trust": 0.1,
"url": "https://creativecommons.org/licenses/by-sa/2.5"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-28697"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-28701"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-28696"
},
{
"trust": 0.1,
"url": "https://security.gentoo.org/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-23033"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-23035"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-28710"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-23034"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-28698"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-28694"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-28699"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-28695"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-28700"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-28702"
},
{
"trust": 0.1,
"url": "https://docs.openshift.com/container-platform/4.9/logging/cluster-logging-release-notes.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-32206"
},
{
"trust": 0.1,
"url": "https://docs.openshift.com/container-platform/4.9/logging/cluster-logging-upgrading.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-32208"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-32206"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2022:6560"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-32208"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-30631"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-30631"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-29154"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-29154"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2022:6460"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-30322"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-21626"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-21626"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-30322"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-30321"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-21628"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2022:7874"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-39399"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-30321"
},
{
"trust": 0.1,
"url": "https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-21619"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-26945"
},
{
"trust": 0.1,
"url": "https://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-21618"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-21624"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-21624"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-21618"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhba-2022:7873"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-21628"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-21619"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-30323"
},
{
"trust": 0.1,
"url": "https://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-26945"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2022-41974"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-406835"
},
{
"db": "VULMON",
"id": "CVE-2022-21123"
},
{
"db": "PACKETSTORM",
"id": "168426"
},
{
"db": "PACKETSTORM",
"id": "169411"
},
{
"db": "PACKETSTORM",
"id": "169304"
},
{
"db": "PACKETSTORM",
"id": "169884"
},
{
"db": "PACKETSTORM",
"id": "168461"
},
{
"db": "PACKETSTORM",
"id": "168076"
},
{
"db": "PACKETSTORM",
"id": "168503"
},
{
"db": "PACKETSTORM",
"id": "168355"
},
{
"db": "PACKETSTORM",
"id": "169941"
},
{
"db": "NVD",
"id": "CVE-2022-21123"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "VULHUB",
"id": "VHN-406835",
"ident": null
},
{
"db": "VULMON",
"id": "CVE-2022-21123",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "168426",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "169411",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "169304",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "169884",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "168461",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "168076",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "168503",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "168355",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "169941",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2022-21123",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2022-06-15T00:00:00",
"db": "VULHUB",
"id": "VHN-406835",
"ident": null
},
{
"date": "2022-06-15T00:00:00",
"db": "VULMON",
"id": "CVE-2022-21123",
"ident": null
},
{
"date": "2022-09-20T13:59:11",
"db": "PACKETSTORM",
"id": "168426",
"ident": null
},
{
"date": "2022-10-18T22:30:59",
"db": "PACKETSTORM",
"id": "169411",
"ident": null
},
{
"date": "2022-07-28T19:12:00",
"db": "PACKETSTORM",
"id": "169304",
"ident": null
},
{
"date": "2022-11-16T16:07:35",
"db": "PACKETSTORM",
"id": "169884",
"ident": null
},
{
"date": "2022-09-22T15:50:52",
"db": "PACKETSTORM",
"id": "168461",
"ident": null
},
{
"date": "2022-08-15T16:03:21",
"db": "PACKETSTORM",
"id": "168076",
"ident": null
},
{
"date": "2022-09-26T15:37:32",
"db": "PACKETSTORM",
"id": "168503",
"ident": null
},
{
"date": "2022-09-13T15:42:59",
"db": "PACKETSTORM",
"id": "168355",
"ident": null
},
{
"date": "2022-11-18T14:28:39",
"db": "PACKETSTORM",
"id": "169941",
"ident": null
},
{
"date": "2022-06-15T20:15:17.503000",
"db": "NVD",
"id": "CVE-2022-21123",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2022-08-19T00:00:00",
"db": "VULHUB",
"id": "VHN-406835",
"ident": null
},
{
"date": "2023-11-07T00:00:00",
"db": "VULMON",
"id": "CVE-2022-21123",
"ident": null
},
{
"date": "2025-05-05T17:17:37.153000",
"db": "NVD",
"id": "CVE-2022-21123",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "remote",
"sources": [
{
"db": "PACKETSTORM",
"id": "168076"
}
],
"trust": 0.1
},
"title": {
"_id": null,
"data": "Red Hat Security Advisory 2022-6537-01",
"sources": [
{
"db": "PACKETSTORM",
"id": "168426"
}
],
"trust": 0.1
},
"type": {
"_id": null,
"data": "code execution",
"sources": [
{
"db": "PACKETSTORM",
"id": "169884"
},
{
"db": "PACKETSTORM",
"id": "168076"
},
{
"db": "PACKETSTORM",
"id": "169941"
}
],
"trust": 0.3
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.