VAR-202206-1157

Vulnerability from variot - Updated: 2025-12-22 22:28

Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. Bugs fixed (https://bugzilla.redhat.com/):

2045880 - CVE-2022-21698 prometheus/client_golang: Denial of service using InstrumentHandlerCounter 2100495 - CVE-2021-38561 golang: out-of-bounds read in golang.org/x/text/language leads to DoS

  1. Description:

The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Bug Fix(es):

  • update RT source tree to the RHEL-8.4.z12 source tree (BZ#2119160)

  • using __this_cpu_add() in preemptible [00000000] - caller is __mod_memcg_lruvec_state+0x69/0x1c0 [None8.4.0.z] (BZ#2124454)

The following packages have been upgraded to a later upstream version: kernel (4.18.0).

Bug Fix(es):

  • DR, Ignore modify TTL if ConnectX-5 doesn't support it (BZ#2075549)

  • execve exit tracepoint not called (BZ#2106663)

  • Unable to boot RHEL-8.6 on Brazos max. (BZ#2107490)

  • soft lockups under heavy I/O load to ahci connected SSDs (BZ#2110773)

  • Allow substituting custom vmlinux.h for the build (BZ#2116407)

  • In addition this updates provides mitigations for the "Retbleed" speculative execution attack and the "MMIO stale data" vulnerabilities.

Bug Fix(es):

  • sched/pelt: Fix attach_entity_load_avg() corner case (BZ#2105360)

  • RHEL9[fleetwood][P9]:kdump fails to capture vmcore when crash is triggered while running forkoff. (BZ#2109144)

  • ISST-LTE:[P10 Everest] [5.14.0-70.9.1.el9_0.ppc64le] HPT:RHEL9.0:ecolp95: lpar crashed at __list_del_entry_valid+0x90/0x100 and LPM failed (BZ#2112823)

  • [rhel9] livepatch panic: RIP: 0010:0xffffffffc0e070c4 seq_read_iter+0x124/0x4b0 (BZ#2122625)

  • System crashes due to list_add double add at iwl_mvm_mac_wake_tx_queue+0x71 (BZ#2123315)

  • [Dell EMC 9.0 BUG] Any process performing I/O doesn't fail on degraded LVM RAID and IO process hangs (BZ#2126215)

  • [HPEMC RHEL 9.0 REGRESSION] net, e810, ice: not enough device MSI-X vectors (BZ#2126491)

  • RHEL9.0 - zfcp: fix missing auto port scan and thus missing target ports (BZ#2127874)

  • Enable check-kabi (BZ#2132372)

  • Add symbols to stablelist (BZ#2132373)

  • Update RHEL9.1 kabi tooling (BZ#2132380)

  • kABI: Prepare the MM subsystem for kABI lockdown (BZ#2133464)

  • [Dell Storage 9.1 BUG] NVME command hang during storage array node reboot (BZ#2133553)

  • WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50 (BZ#2134589)

  • crypto/testmgr.c should not list dh, ecdh-nist-p256, ecdh-nist-p384 as .fips_allowed = 1 (BZ#2136523)

  • FIPS self-tests for RSA pkcs7 signature verification (BZ#2136552)

  • [ovs-tc] Bad length in dpctl/dump-flows (BZ#2137354)

  • [RHEL9] s_pf0vf2: hw csum failure for mlx5 (BZ#2137355)

  • kernel memory leak while freeing nested actions (BZ#2137356)

  • ovs: backports from upstream (BZ#2137358)

  • kernel should conform to FIPS-140-3 requirements (both parts) (BZ#2139095)

  • [DELL EMC 9.0-RT BUG] System is not booting into RT Kernel with perc12. (BZ#2139214)

  • Fix panic in nbd/004 test (BZ#2139535)

  • Nested KVM is not working on RHEL 8.6 with hardware error 0x7 (BZ#2140141)

  • [RHEL9] Practically limit "Dummy wait" workaround to old Intel systems (BZ#2142169)

CVE-2022-21123, CVE-2022-21125, CVE-2022-21127, CVE-2022-21166

Various researchers discovered flaws in Intel processors,
collectively referred to as MMIO Stale Data vulnerabilities, which
may result in information leak to local users.

For details please refer to
https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html

CVE-2022-21151

Alysa Milburn, Jason Brandt, Avishai Redelman and Nir Lavi
discovered that for some Intel processors optimization removal or
modification of security-critical code may result in information
disclosure to local users.

For the oldstable distribution (buster), these problems have been fixed in version 3.20220510.1~deb10u1.

For the stable distribution (bullseye), these problems have been fixed in version 3.20220510.1~deb11u1.

We recommend that you upgrade your intel-microcode packages.

For the detailed security status of intel-microcode please refer to its security tracker page at: https://security-tracker.debian.org/tracker/intel-microcode

Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----

iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmLFiNRfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0QsfQ/7BFnYhmBMr5u1iyXJY79QkOuBFij/I7N5doGb/5m/LTbUOKgHKlI3XKqr NHbWZWQZVO7gexkZIdGSY2RnCtVS1oNkKxNzuFVxkPjbsRpJJBAyPqoY6JogDjhM 18jXAyZqB5tfZdGohiHBeVDsQwP5M3IPTdG2USoLOwcwd5+BK8ZgdrLrREDHo9mA +VJU8fhGRpdminz5MR2NPenu5jgG2JVKAhFRC8ioy92umF/5c/C6wRAyQsRid4lZ i+lzWAOQbUzvUGlomDrjqtSEn0fVQR2A0VoU+5AQnln8fODQmSLOHo/Ti00RuUUL 8WLfrKnfimXvTWnUeWKLCnHIRCbzLBfPa1EPbCagkD7XDkcYd+MWLm0C6RhUvBPN p3U9AbWstO4z2RjldX1DYUVeCR5zQqBT6pAY6G14MqIvuqrAodi9p0jgjOchdCUZ Hv4H6b0F7QusCZrj1onfe4//CG5AmN0D8E/QKCKNBplJmciVg2o/8R0hTfaKDK8v NhUYBkEWnG0zUlo93Qkapqc00j5i7cbXKbzRV3zPa42WtypoS8yd/tftZ6y7yBpa lHZOAVcfdDcN7jm9U9ZV3tVCCs3Cu5wb3ZYoYyhfEZBpEgCQ7YEEPQffTq9Y3LMN 4IUiKp8LINReMEEfV8My7PB2fX8dvti2lEQ/pJfAC/XKNoassd0= =8N2y -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2022:7279-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2022:7279 Issue date: 2022-11-01 CVE Names: CVE-2022-2588 CVE-2022-21123 CVE-2022-21125 CVE-2022-21166 ==================================================================== 1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux BaseOS AUS (v. 8.2) - aarch64, noarch, ppc64le, s390x, x86_64 Red Hat Enterprise Linux BaseOS E4S (v. 8.2) - aarch64, noarch, ppc64le, s390x, x86_64 Red Hat Enterprise Linux BaseOS TUS (v. 8.2) - aarch64, noarch, ppc64le, s390x, x86_64

  1. Description:

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation (CVE-2022-2588)

  • hw: cpu: Incomplete cleanup of multi-core shared buffers (aka SBDR) (CVE-2022-21123)

  • hw: cpu: Incomplete cleanup of microarchitectural fill buffers (aka SBDS) (CVE-2022-21125)

  • hw: cpu: Incomplete cleanup in specific special register write operations (aka DRPW) (CVE-2022-21166)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • RHEL8.6[64TB/240c Denali]:" vmcore failed, _exitcode:139" error observed while capturing vmcore during fadump after memory remove. incomplete vmcore is captured. (BZ#2107491)

  • Solution:

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

  1. Bugs fixed (https://bugzilla.redhat.com/):

2090237 - CVE-2022-21123 hw: cpu: Incomplete cleanup of multi-core shared buffers (aka SBDR) 2090240 - CVE-2022-21125 hw: cpu: Incomplete cleanup of microarchitectural fill buffers (aka SBDS) 2090241 - CVE-2022-21166 hw: cpu: Incomplete cleanup in specific special register write operations (aka DRPW) 2114849 - CVE-2022-2588 kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation

  1. Package List:

Red Hat Enterprise Linux BaseOS AUS (v. 8.2):

Source: kernel-4.18.0-193.93.1.el8_2.src.rpm

aarch64: bpftool-4.18.0-193.93.1.el8_2.aarch64.rpm bpftool-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-core-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-cross-headers-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debug-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debug-core-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debug-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debug-devel-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debug-modules-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debug-modules-extra-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debuginfo-common-aarch64-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-devel-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-headers-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-modules-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-modules-extra-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-tools-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-tools-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-tools-libs-4.18.0-193.93.1.el8_2.aarch64.rpm perf-4.18.0-193.93.1.el8_2.aarch64.rpm perf-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm python3-perf-4.18.0-193.93.1.el8_2.aarch64.rpm python3-perf-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm

noarch: kernel-abi-whitelists-4.18.0-193.93.1.el8_2.noarch.rpm kernel-doc-4.18.0-193.93.1.el8_2.noarch.rpm

ppc64le: bpftool-4.18.0-193.93.1.el8_2.ppc64le.rpm bpftool-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-core-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-cross-headers-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debug-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debug-core-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debug-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debug-devel-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debug-modules-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debug-modules-extra-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-devel-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-headers-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-modules-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-modules-extra-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-tools-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-tools-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-tools-libs-4.18.0-193.93.1.el8_2.ppc64le.rpm perf-4.18.0-193.93.1.el8_2.ppc64le.rpm perf-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm python3-perf-4.18.0-193.93.1.el8_2.ppc64le.rpm python3-perf-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm

s390x: bpftool-4.18.0-193.93.1.el8_2.s390x.rpm bpftool-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm kernel-4.18.0-193.93.1.el8_2.s390x.rpm kernel-core-4.18.0-193.93.1.el8_2.s390x.rpm kernel-cross-headers-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debug-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debug-core-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debug-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debug-devel-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debug-modules-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debug-modules-extra-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debuginfo-common-s390x-4.18.0-193.93.1.el8_2.s390x.rpm kernel-devel-4.18.0-193.93.1.el8_2.s390x.rpm kernel-headers-4.18.0-193.93.1.el8_2.s390x.rpm kernel-modules-4.18.0-193.93.1.el8_2.s390x.rpm kernel-modules-extra-4.18.0-193.93.1.el8_2.s390x.rpm kernel-tools-4.18.0-193.93.1.el8_2.s390x.rpm kernel-tools-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm kernel-zfcpdump-4.18.0-193.93.1.el8_2.s390x.rpm kernel-zfcpdump-core-4.18.0-193.93.1.el8_2.s390x.rpm kernel-zfcpdump-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm kernel-zfcpdump-devel-4.18.0-193.93.1.el8_2.s390x.rpm kernel-zfcpdump-modules-4.18.0-193.93.1.el8_2.s390x.rpm kernel-zfcpdump-modules-extra-4.18.0-193.93.1.el8_2.s390x.rpm perf-4.18.0-193.93.1.el8_2.s390x.rpm perf-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm python3-perf-4.18.0-193.93.1.el8_2.s390x.rpm python3-perf-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm

x86_64: bpftool-4.18.0-193.93.1.el8_2.x86_64.rpm bpftool-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-core-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-cross-headers-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debug-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debug-core-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debug-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debug-devel-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debug-modules-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debug-modules-extra-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debuginfo-common-x86_64-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-devel-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-headers-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-modules-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-modules-extra-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-tools-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-tools-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-tools-libs-4.18.0-193.93.1.el8_2.x86_64.rpm perf-4.18.0-193.93.1.el8_2.x86_64.rpm perf-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm python3-perf-4.18.0-193.93.1.el8_2.x86_64.rpm python3-perf-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm

Red Hat Enterprise Linux BaseOS E4S (v. 8.2):

Source: kernel-4.18.0-193.93.1.el8_2.src.rpm

aarch64: bpftool-4.18.0-193.93.1.el8_2.aarch64.rpm bpftool-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-core-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-cross-headers-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debug-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debug-core-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debug-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debug-devel-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debug-modules-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debug-modules-extra-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debuginfo-common-aarch64-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-devel-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-headers-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-modules-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-modules-extra-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-tools-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-tools-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-tools-libs-4.18.0-193.93.1.el8_2.aarch64.rpm perf-4.18.0-193.93.1.el8_2.aarch64.rpm perf-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm python3-perf-4.18.0-193.93.1.el8_2.aarch64.rpm python3-perf-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm

noarch: kernel-abi-whitelists-4.18.0-193.93.1.el8_2.noarch.rpm kernel-doc-4.18.0-193.93.1.el8_2.noarch.rpm

ppc64le: bpftool-4.18.0-193.93.1.el8_2.ppc64le.rpm bpftool-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-core-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-cross-headers-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debug-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debug-core-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debug-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debug-devel-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debug-modules-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debug-modules-extra-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-devel-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-headers-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-modules-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-modules-extra-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-tools-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-tools-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-tools-libs-4.18.0-193.93.1.el8_2.ppc64le.rpm perf-4.18.0-193.93.1.el8_2.ppc64le.rpm perf-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm python3-perf-4.18.0-193.93.1.el8_2.ppc64le.rpm python3-perf-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm

s390x: bpftool-4.18.0-193.93.1.el8_2.s390x.rpm bpftool-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm kernel-4.18.0-193.93.1.el8_2.s390x.rpm kernel-core-4.18.0-193.93.1.el8_2.s390x.rpm kernel-cross-headers-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debug-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debug-core-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debug-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debug-devel-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debug-modules-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debug-modules-extra-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debuginfo-common-s390x-4.18.0-193.93.1.el8_2.s390x.rpm kernel-devel-4.18.0-193.93.1.el8_2.s390x.rpm kernel-headers-4.18.0-193.93.1.el8_2.s390x.rpm kernel-modules-4.18.0-193.93.1.el8_2.s390x.rpm kernel-modules-extra-4.18.0-193.93.1.el8_2.s390x.rpm kernel-tools-4.18.0-193.93.1.el8_2.s390x.rpm kernel-tools-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm kernel-zfcpdump-4.18.0-193.93.1.el8_2.s390x.rpm kernel-zfcpdump-core-4.18.0-193.93.1.el8_2.s390x.rpm kernel-zfcpdump-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm kernel-zfcpdump-devel-4.18.0-193.93.1.el8_2.s390x.rpm kernel-zfcpdump-modules-4.18.0-193.93.1.el8_2.s390x.rpm kernel-zfcpdump-modules-extra-4.18.0-193.93.1.el8_2.s390x.rpm perf-4.18.0-193.93.1.el8_2.s390x.rpm perf-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm python3-perf-4.18.0-193.93.1.el8_2.s390x.rpm python3-perf-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm

x86_64: bpftool-4.18.0-193.93.1.el8_2.x86_64.rpm bpftool-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-core-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-cross-headers-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debug-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debug-core-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debug-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debug-devel-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debug-modules-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debug-modules-extra-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debuginfo-common-x86_64-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-devel-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-headers-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-modules-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-modules-extra-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-tools-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-tools-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-tools-libs-4.18.0-193.93.1.el8_2.x86_64.rpm perf-4.18.0-193.93.1.el8_2.x86_64.rpm perf-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm python3-perf-4.18.0-193.93.1.el8_2.x86_64.rpm python3-perf-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm

Red Hat Enterprise Linux BaseOS TUS (v. 8.2):

Source: kernel-4.18.0-193.93.1.el8_2.src.rpm

aarch64: bpftool-4.18.0-193.93.1.el8_2.aarch64.rpm bpftool-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-core-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-cross-headers-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debug-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debug-core-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debug-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debug-devel-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debug-modules-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debug-modules-extra-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-debuginfo-common-aarch64-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-devel-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-headers-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-modules-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-modules-extra-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-tools-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-tools-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm kernel-tools-libs-4.18.0-193.93.1.el8_2.aarch64.rpm perf-4.18.0-193.93.1.el8_2.aarch64.rpm perf-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm python3-perf-4.18.0-193.93.1.el8_2.aarch64.rpm python3-perf-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm

noarch: kernel-abi-whitelists-4.18.0-193.93.1.el8_2.noarch.rpm kernel-doc-4.18.0-193.93.1.el8_2.noarch.rpm

ppc64le: bpftool-4.18.0-193.93.1.el8_2.ppc64le.rpm bpftool-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-core-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-cross-headers-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debug-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debug-core-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debug-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debug-devel-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debug-modules-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debug-modules-extra-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-devel-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-headers-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-modules-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-modules-extra-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-tools-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-tools-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm kernel-tools-libs-4.18.0-193.93.1.el8_2.ppc64le.rpm perf-4.18.0-193.93.1.el8_2.ppc64le.rpm perf-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm python3-perf-4.18.0-193.93.1.el8_2.ppc64le.rpm python3-perf-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm

s390x: bpftool-4.18.0-193.93.1.el8_2.s390x.rpm bpftool-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm kernel-4.18.0-193.93.1.el8_2.s390x.rpm kernel-core-4.18.0-193.93.1.el8_2.s390x.rpm kernel-cross-headers-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debug-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debug-core-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debug-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debug-devel-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debug-modules-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debug-modules-extra-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm kernel-debuginfo-common-s390x-4.18.0-193.93.1.el8_2.s390x.rpm kernel-devel-4.18.0-193.93.1.el8_2.s390x.rpm kernel-headers-4.18.0-193.93.1.el8_2.s390x.rpm kernel-modules-4.18.0-193.93.1.el8_2.s390x.rpm kernel-modules-extra-4.18.0-193.93.1.el8_2.s390x.rpm kernel-tools-4.18.0-193.93.1.el8_2.s390x.rpm kernel-tools-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm kernel-zfcpdump-4.18.0-193.93.1.el8_2.s390x.rpm kernel-zfcpdump-core-4.18.0-193.93.1.el8_2.s390x.rpm kernel-zfcpdump-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm kernel-zfcpdump-devel-4.18.0-193.93.1.el8_2.s390x.rpm kernel-zfcpdump-modules-4.18.0-193.93.1.el8_2.s390x.rpm kernel-zfcpdump-modules-extra-4.18.0-193.93.1.el8_2.s390x.rpm perf-4.18.0-193.93.1.el8_2.s390x.rpm perf-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm python3-perf-4.18.0-193.93.1.el8_2.s390x.rpm python3-perf-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm

x86_64: bpftool-4.18.0-193.93.1.el8_2.x86_64.rpm bpftool-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-core-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-cross-headers-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debug-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debug-core-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debug-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debug-devel-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debug-modules-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debug-modules-extra-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-debuginfo-common-x86_64-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-devel-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-headers-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-modules-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-modules-extra-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-tools-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-tools-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm kernel-tools-libs-4.18.0-193.93.1.el8_2.x86_64.rpm perf-4.18.0-193.93.1.el8_2.x86_64.rpm perf-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm python3-perf-4.18.0-193.93.1.el8_2.x86_64.rpm python3-perf-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2022-2588 https://access.redhat.com/security/cve/CVE-2022-21123 https://access.redhat.com/security/cve/CVE-2022-21125 https://access.redhat.com/security/cve/CVE-2022-21166 https://access.redhat.com/security/updates/classification/#important

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iQIVAwUBY2FrqdzjgjWX9erEAQjbTw/+Ps/k3la19UWPfhXXquENlVWAjtSU+2al YnHn/MYUA6aKoNDiSrzqnPTRgrLGymgTNzvRkc4s+A/ZduwWrlVeJv39tXGx1GrV jdjuDXhigMHxaNFH5nlnQMYUhT5bGhOdPXIAuYkQc2j1lySXXs8LBK17E4vav4XD q5MEAkYC7n3WRR6i0c9cpEFBaWbysPE1NkMaJ9Ofc5kCFW4eaW/1IloahR/g0ifN drkBK160d1I2PoMLIF25rWE62viDwiZQZXqZ54UzzUnD1auzKTP3tOwyYrsi+lLU 1x9Wcik925mXtt+6m1FavuE2yPVs0kzQ34Q7mUinRchwKQUkiP643t2tadOCwDVx jOygsdFlzwm1ODZo7NG/xM3tLHxqbMXy0nV/YIJ1tbHEOxfcYMtIUQaOf5zfJzBr uVajIReonF0qZiNxVsdR/gl22t2jjIOaAPsmTq6h2KRZI2qEsI7Y+IgPKjDcCtzS noK0+G+x4k8hn0FDOA+4+4cd3aXhpEORxtjkRbJ7t12e1E1ZIck0SVOzoqjoAq7p LmPVxRZBQWVqIcR5IHKx7EZYLxRBLPR74u4zuK86VpESJm8Ie15YiXHY4RpbJFfa NgpWn5XipOXMl6KzyE5bEyzAle/NyhwoMX6kJ7gPP7irOeBpDVoVG2Go+Iq1xHvB ZPiXszO1jjc=k0bc -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . Description:

Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.

This advisory contains the container images for Red Hat OpenShift Container Platform 4.8.53. See the following advisory for the RPM packages for this release:

https://access.redhat.com/errata/RHBA-2022:7873

Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:

https://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html

Security Fix(es):

  • go-getter: command injection vulnerability (CVE-2022-26945)
  • go-getter: unsafe download (issue 1 of 3) (CVE-2022-30321)
  • go-getter: unsafe download (issue 2 of 3) (CVE-2022-30322)
  • go-getter: unsafe download (issue 3 of 3) (CVE-2022-30323)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Solution:

For OpenShift Container Platform 4.8 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:

https://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html

You may download the oc tool and use it to inspect release image metadata for x86_64, s390x, and ppc64le architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags

The sha values for the release are:

(For x86_64 architecture) The image digest is sha256:ac2bbfa7036c64bbdb44f9a74df3dbafcff1b851d812bf2a48c4fabcac3c7a53

(For s390x architecture) The image digest is sha256:ac2c74a664257cea299126d4f789cdf9a5a4efc4a4e8c2361b943374d4eb21e4

(For ppc64le architecture) The image digest is sha256:53adc42ed30ad39d7117837dbf5a6db6943a8f0b3b61bc0d046b83394f5c28b2

All OpenShift Container Platform 4.8 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html

  1. Bugs fixed (https://bugzilla.redhat.com/):

2077100 - Console backend check for Web Terminal Operator incorrectly returns HTTP 204 2092918 - CVE-2022-30321 go-getter: unsafe download (issue 1 of 3) 2092923 - CVE-2022-30322 go-getter: unsafe download (issue 2 of 3) 2092925 - CVE-2022-30323 go-getter: unsafe download (issue 3 of 3) 2092928 - CVE-2022-26945 go-getter: command injection vulnerability

  1. JIRA issues fixed (https://issues.jboss.org/):

OCPBUGS-2205 - Prefer local dns does not work expectedly on OCPv4.8 OCPBUGS-2347 - [cluster-api-provider-baremetal] fix 4.8 build OCPBUGS-2577 - [4.8] ETCD Operator goes degraded when a second internal node ip is added OCPBUGS-2773 - e2e tests: Installs Red Hat Integration - 3scale operator test is failing due to change of Operator name OCPBUGS-2989 - [4.8] cri-o should report the stage of container and pod creation it's stuck at

  1. Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied. Bugs fixed (https://bugzilla.redhat.com/):

2094982 - CVE-2022-1996 go-restful: Authorization Bypass Through User-Controlled Key 2130218 - 4.9.7 containers

5

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202206-1157",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "11.0"
      },
      {
        "model": "fedora",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "fedoraproject",
        "version": "35"
      },
      {
        "model": "sgx sdk",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "2.16.100.3"
      },
      {
        "model": "fedora",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "fedoraproject",
        "version": "36"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "9.0"
      },
      {
        "model": "sgx psw",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "2.16.100.3"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "10.0"
      },
      {
        "model": "xen",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "xen",
        "version": "*"
      },
      {
        "model": "sgx sdk",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "2.17.100.3"
      },
      {
        "model": "sgx psw",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "2.17.100.3"
      },
      {
        "model": "esxi",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "vmware",
        "version": "7.0"
      },
      {
        "model": "sgx dcap",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "intel",
        "version": "1.14.100.3"
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2022-21166"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Red Hat",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "168426"
      },
      {
        "db": "PACKETSTORM",
        "id": "169411"
      },
      {
        "db": "PACKETSTORM",
        "id": "169409"
      },
      {
        "db": "PACKETSTORM",
        "id": "168694"
      },
      {
        "db": "PACKETSTORM",
        "id": "170226"
      },
      {
        "db": "PACKETSTORM",
        "id": "169688"
      },
      {
        "db": "PACKETSTORM",
        "id": "169941"
      },
      {
        "db": "PACKETSTORM",
        "id": "169997"
      }
    ],
    "trust": 0.8
  },
  "cve": "CVE-2022-21166",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CVE-2022-21166",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 1.0,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "VHN-406844",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "id": "CVE-2022-21166",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 2.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2022-21166",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            "id": "CVE-2022-21166",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-406844",
            "trust": 0.1,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-406844"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-21166"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-21166"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. Bugs fixed (https://bugzilla.redhat.com/):\n\n2045880 - CVE-2022-21698 prometheus/client_golang: Denial of service using InstrumentHandlerCounter\n2100495 - CVE-2021-38561 golang: out-of-bounds read in golang.org/x/text/language leads to DoS\n\n5. Description:\n\nThe kernel-rt packages provide the Real Time Linux Kernel, which enables\nfine-tuning for systems with extremely high determinism requirements. \n\nBug Fix(es):\n\n* update RT source tree to the RHEL-8.4.z12 source tree (BZ#2119160)\n\n* using __this_cpu_add() in preemptible [00000000] - caller is\n__mod_memcg_lruvec_state+0x69/0x1c0 [None8.4.0.z] (BZ#2124454)\n\n4. \n\nThe following packages have been upgraded to a later upstream version:\nkernel (4.18.0). \n\nBug Fix(es):\n\n* DR, Ignore modify TTL if ConnectX-5 doesn\u0027t support it (BZ#2075549)\n\n* execve exit tracepoint not called (BZ#2106663)\n\n* Unable to boot RHEL-8.6 on Brazos max. \n(BZ#2107490)\n\n* soft lockups under heavy I/O load to ahci connected SSDs (BZ#2110773)\n\n* Allow substituting custom vmlinux.h for the build (BZ#2116407)\n\n4. In addition this updates provides\nmitigations for the \"Retbleed\" speculative execution attack and the\n\"MMIO stale data\" vulnerabilities. \n\nBug Fix(es):\n\n* sched/pelt: Fix attach_entity_load_avg() corner case (BZ#2105360)\n\n* RHEL9[fleetwood][P9]:kdump fails to capture vmcore when crash is\ntriggered while running forkoff. (BZ#2109144)\n\n* ISST-LTE:[P10 Everest] [5.14.0-70.9.1.el9_0.ppc64le] HPT:RHEL9.0:ecolp95:\nlpar crashed at __list_del_entry_valid+0x90/0x100 and LPM failed\n(BZ#2112823)\n\n* [rhel9] livepatch panic: RIP: 0010:0xffffffffc0e070c4\nseq_read_iter+0x124/0x4b0 (BZ#2122625)\n\n* System crashes due to list_add double add at\niwl_mvm_mac_wake_tx_queue+0x71 (BZ#2123315)\n\n* [Dell EMC 9.0 BUG] Any process performing I/O doesn\u0027t fail on degraded\nLVM RAID and IO process hangs (BZ#2126215)\n\n* [HPEMC RHEL 9.0 REGRESSION] net, e810, ice: not enough device MSI-X\nvectors (BZ#2126491)\n\n* RHEL9.0 - zfcp: fix missing auto port scan and thus missing target ports\n(BZ#2127874)\n\n* Enable check-kabi (BZ#2132372)\n\n* Add symbols to stablelist (BZ#2132373)\n\n* Update RHEL9.1 kabi tooling (BZ#2132380)\n\n* kABI: Prepare the MM subsystem for kABI lockdown (BZ#2133464)\n\n* [Dell Storage 9.1 BUG] NVME command hang during storage array node reboot\n(BZ#2133553)\n\n* WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105\nex_handler_fprestore+0x3f/0x50 (BZ#2134589)\n\n* crypto/testmgr.c should not list dh, ecdh-nist-p256, ecdh-nist-p384 as\n.fips_allowed = 1 (BZ#2136523)\n\n* FIPS self-tests for RSA pkcs7 signature verification (BZ#2136552)\n\n* [ovs-tc] Bad length in dpctl/dump-flows (BZ#2137354)\n\n* [RHEL9] s_pf0vf2: hw csum failure for mlx5 (BZ#2137355)\n\n* kernel memory leak while freeing nested actions (BZ#2137356)\n\n* ovs: backports from upstream (BZ#2137358)\n\n* kernel should conform to FIPS-140-3 requirements (both parts)\n(BZ#2139095)\n\n* [DELL EMC 9.0-RT BUG] System is not booting into RT Kernel with perc12. \n(BZ#2139214)\n\n* Fix panic in nbd/004 test (BZ#2139535)\n\n* Nested KVM is not working on RHEL 8.6 with hardware error 0x7\n(BZ#2140141)\n\n* [RHEL9] Practically limit \"Dummy wait\" workaround to old Intel systems\n(BZ#2142169)\n\n4. \n\nCVE-2022-21123, CVE-2022-21125, CVE-2022-21127, CVE-2022-21166\n\n    Various researchers discovered flaws in Intel processors,\n    collectively referred to as MMIO Stale Data vulnerabilities, which\n    may result in information leak to local users. \n\n    For details please refer to\n    https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html\n\nCVE-2022-21151\n\n    Alysa Milburn, Jason Brandt, Avishai Redelman and Nir Lavi\n    discovered that for some Intel processors optimization removal or\n    modification of security-critical code may result in information\n    disclosure to local users. \n\nFor the oldstable distribution (buster), these problems have been fixed\nin version 3.20220510.1~deb10u1. \n\nFor the stable distribution (bullseye), these problems have been fixed in\nversion 3.20220510.1~deb11u1. \n\nWe recommend that you upgrade your intel-microcode packages. \n\nFor the detailed security status of intel-microcode please refer to its\nsecurity tracker page at:\nhttps://security-tracker.debian.org/tracker/intel-microcode\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\n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\n4IUiKp8LINReMEEfV8My7PB2fX8dvti2lEQ/pJfAC/XKNoassd0=\n=8N2y\n-----END PGP SIGNATURE-----\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n====================================================================                   \nRed Hat Security Advisory\n\nSynopsis:          Important: kernel security and bug fix update\nAdvisory ID:       RHSA-2022:7279-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://access.redhat.com/errata/RHSA-2022:7279\nIssue date:        2022-11-01\nCVE Names:         CVE-2022-2588 CVE-2022-21123 CVE-2022-21125\n                   CVE-2022-21166\n====================================================================\n1. Summary:\n\nAn update for kernel is now available for Red Hat Enterprise Linux 8.2\nAdvanced Mission Critical Update Support, Red Hat Enterprise Linux 8.2\nTelecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update\nServices for SAP Solutions. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux BaseOS AUS (v. 8.2) - aarch64, noarch, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux BaseOS E4S (v. 8.2) - aarch64, noarch, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux BaseOS TUS (v. 8.2) - aarch64, noarch, ppc64le, s390x, x86_64\n\n3. Description:\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system. \n\nSecurity Fix(es):\n\n* kernel: a use-after-free in cls_route filter implementation may lead to\nprivilege escalation (CVE-2022-2588)\n\n* hw: cpu: Incomplete cleanup of multi-core shared buffers (aka SBDR)\n(CVE-2022-21123)\n\n* hw: cpu: Incomplete cleanup of microarchitectural fill buffers (aka SBDS)\n(CVE-2022-21125)\n\n* hw: cpu: Incomplete cleanup in specific special register write operations\n(aka DRPW) (CVE-2022-21166)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\nBug Fix(es):\n\n* RHEL8.6[64TB/240c Denali]:\" vmcore failed, _exitcode:139\" error observed\nwhile capturing vmcore during fadump after memory remove. incomplete vmcore\nis captured. (BZ#2107491)\n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n2090237 - CVE-2022-21123 hw: cpu: Incomplete cleanup of multi-core shared buffers (aka SBDR)\n2090240 - CVE-2022-21125 hw: cpu: Incomplete cleanup of microarchitectural fill buffers (aka SBDS)\n2090241 - CVE-2022-21166 hw: cpu: Incomplete cleanup in specific special register write operations (aka DRPW)\n2114849 - CVE-2022-2588 kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation\n\n6. Package List:\n\nRed Hat Enterprise Linux BaseOS AUS (v. 8.2):\n\nSource:\nkernel-4.18.0-193.93.1.el8_2.src.rpm\n\naarch64:\nbpftool-4.18.0-193.93.1.el8_2.aarch64.rpm\nbpftool-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-core-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-cross-headers-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-debug-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-debug-core-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-debug-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-debug-devel-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-debug-modules-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-debug-modules-extra-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-debuginfo-common-aarch64-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-devel-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-headers-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-modules-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-modules-extra-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-tools-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-tools-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-tools-libs-4.18.0-193.93.1.el8_2.aarch64.rpm\nperf-4.18.0-193.93.1.el8_2.aarch64.rpm\nperf-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm\npython3-perf-4.18.0-193.93.1.el8_2.aarch64.rpm\npython3-perf-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm\n\nnoarch:\nkernel-abi-whitelists-4.18.0-193.93.1.el8_2.noarch.rpm\nkernel-doc-4.18.0-193.93.1.el8_2.noarch.rpm\n\nppc64le:\nbpftool-4.18.0-193.93.1.el8_2.ppc64le.rpm\nbpftool-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-core-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-cross-headers-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-debug-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-debug-core-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-debug-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-debug-devel-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-debug-modules-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-debug-modules-extra-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-devel-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-headers-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-modules-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-modules-extra-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-tools-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-tools-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-tools-libs-4.18.0-193.93.1.el8_2.ppc64le.rpm\nperf-4.18.0-193.93.1.el8_2.ppc64le.rpm\nperf-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm\npython3-perf-4.18.0-193.93.1.el8_2.ppc64le.rpm\npython3-perf-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm\n\ns390x:\nbpftool-4.18.0-193.93.1.el8_2.s390x.rpm\nbpftool-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-core-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-cross-headers-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-debug-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-debug-core-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-debug-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-debug-devel-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-debug-modules-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-debug-modules-extra-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-debuginfo-common-s390x-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-devel-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-headers-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-modules-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-modules-extra-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-tools-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-tools-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-zfcpdump-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-zfcpdump-core-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-zfcpdump-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-zfcpdump-devel-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-zfcpdump-modules-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-zfcpdump-modules-extra-4.18.0-193.93.1.el8_2.s390x.rpm\nperf-4.18.0-193.93.1.el8_2.s390x.rpm\nperf-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm\npython3-perf-4.18.0-193.93.1.el8_2.s390x.rpm\npython3-perf-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm\n\nx86_64:\nbpftool-4.18.0-193.93.1.el8_2.x86_64.rpm\nbpftool-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-core-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-cross-headers-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-debug-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-debug-core-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-debug-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-debug-devel-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-debug-modules-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-debug-modules-extra-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-debuginfo-common-x86_64-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-devel-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-headers-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-modules-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-modules-extra-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-tools-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-tools-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-tools-libs-4.18.0-193.93.1.el8_2.x86_64.rpm\nperf-4.18.0-193.93.1.el8_2.x86_64.rpm\nperf-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm\npython3-perf-4.18.0-193.93.1.el8_2.x86_64.rpm\npython3-perf-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm\n\nRed Hat Enterprise Linux BaseOS E4S (v. 8.2):\n\nSource:\nkernel-4.18.0-193.93.1.el8_2.src.rpm\n\naarch64:\nbpftool-4.18.0-193.93.1.el8_2.aarch64.rpm\nbpftool-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-core-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-cross-headers-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-debug-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-debug-core-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-debug-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-debug-devel-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-debug-modules-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-debug-modules-extra-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-debuginfo-common-aarch64-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-devel-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-headers-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-modules-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-modules-extra-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-tools-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-tools-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-tools-libs-4.18.0-193.93.1.el8_2.aarch64.rpm\nperf-4.18.0-193.93.1.el8_2.aarch64.rpm\nperf-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm\npython3-perf-4.18.0-193.93.1.el8_2.aarch64.rpm\npython3-perf-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm\n\nnoarch:\nkernel-abi-whitelists-4.18.0-193.93.1.el8_2.noarch.rpm\nkernel-doc-4.18.0-193.93.1.el8_2.noarch.rpm\n\nppc64le:\nbpftool-4.18.0-193.93.1.el8_2.ppc64le.rpm\nbpftool-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-core-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-cross-headers-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-debug-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-debug-core-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-debug-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-debug-devel-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-debug-modules-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-debug-modules-extra-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-devel-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-headers-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-modules-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-modules-extra-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-tools-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-tools-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-tools-libs-4.18.0-193.93.1.el8_2.ppc64le.rpm\nperf-4.18.0-193.93.1.el8_2.ppc64le.rpm\nperf-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm\npython3-perf-4.18.0-193.93.1.el8_2.ppc64le.rpm\npython3-perf-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm\n\ns390x:\nbpftool-4.18.0-193.93.1.el8_2.s390x.rpm\nbpftool-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-core-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-cross-headers-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-debug-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-debug-core-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-debug-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-debug-devel-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-debug-modules-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-debug-modules-extra-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-debuginfo-common-s390x-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-devel-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-headers-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-modules-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-modules-extra-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-tools-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-tools-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-zfcpdump-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-zfcpdump-core-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-zfcpdump-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-zfcpdump-devel-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-zfcpdump-modules-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-zfcpdump-modules-extra-4.18.0-193.93.1.el8_2.s390x.rpm\nperf-4.18.0-193.93.1.el8_2.s390x.rpm\nperf-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm\npython3-perf-4.18.0-193.93.1.el8_2.s390x.rpm\npython3-perf-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm\n\nx86_64:\nbpftool-4.18.0-193.93.1.el8_2.x86_64.rpm\nbpftool-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-core-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-cross-headers-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-debug-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-debug-core-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-debug-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-debug-devel-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-debug-modules-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-debug-modules-extra-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-debuginfo-common-x86_64-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-devel-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-headers-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-modules-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-modules-extra-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-tools-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-tools-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-tools-libs-4.18.0-193.93.1.el8_2.x86_64.rpm\nperf-4.18.0-193.93.1.el8_2.x86_64.rpm\nperf-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm\npython3-perf-4.18.0-193.93.1.el8_2.x86_64.rpm\npython3-perf-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm\n\nRed Hat Enterprise Linux BaseOS TUS (v. 8.2):\n\nSource:\nkernel-4.18.0-193.93.1.el8_2.src.rpm\n\naarch64:\nbpftool-4.18.0-193.93.1.el8_2.aarch64.rpm\nbpftool-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-core-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-cross-headers-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-debug-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-debug-core-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-debug-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-debug-devel-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-debug-modules-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-debug-modules-extra-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-debuginfo-common-aarch64-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-devel-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-headers-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-modules-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-modules-extra-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-tools-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-tools-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm\nkernel-tools-libs-4.18.0-193.93.1.el8_2.aarch64.rpm\nperf-4.18.0-193.93.1.el8_2.aarch64.rpm\nperf-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm\npython3-perf-4.18.0-193.93.1.el8_2.aarch64.rpm\npython3-perf-debuginfo-4.18.0-193.93.1.el8_2.aarch64.rpm\n\nnoarch:\nkernel-abi-whitelists-4.18.0-193.93.1.el8_2.noarch.rpm\nkernel-doc-4.18.0-193.93.1.el8_2.noarch.rpm\n\nppc64le:\nbpftool-4.18.0-193.93.1.el8_2.ppc64le.rpm\nbpftool-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-core-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-cross-headers-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-debug-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-debug-core-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-debug-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-debug-devel-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-debug-modules-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-debug-modules-extra-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-devel-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-headers-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-modules-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-modules-extra-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-tools-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-tools-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm\nkernel-tools-libs-4.18.0-193.93.1.el8_2.ppc64le.rpm\nperf-4.18.0-193.93.1.el8_2.ppc64le.rpm\nperf-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm\npython3-perf-4.18.0-193.93.1.el8_2.ppc64le.rpm\npython3-perf-debuginfo-4.18.0-193.93.1.el8_2.ppc64le.rpm\n\ns390x:\nbpftool-4.18.0-193.93.1.el8_2.s390x.rpm\nbpftool-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-core-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-cross-headers-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-debug-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-debug-core-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-debug-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-debug-devel-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-debug-modules-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-debug-modules-extra-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-debuginfo-common-s390x-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-devel-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-headers-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-modules-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-modules-extra-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-tools-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-tools-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-zfcpdump-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-zfcpdump-core-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-zfcpdump-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-zfcpdump-devel-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-zfcpdump-modules-4.18.0-193.93.1.el8_2.s390x.rpm\nkernel-zfcpdump-modules-extra-4.18.0-193.93.1.el8_2.s390x.rpm\nperf-4.18.0-193.93.1.el8_2.s390x.rpm\nperf-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm\npython3-perf-4.18.0-193.93.1.el8_2.s390x.rpm\npython3-perf-debuginfo-4.18.0-193.93.1.el8_2.s390x.rpm\n\nx86_64:\nbpftool-4.18.0-193.93.1.el8_2.x86_64.rpm\nbpftool-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-core-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-cross-headers-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-debug-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-debug-core-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-debug-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-debug-devel-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-debug-modules-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-debug-modules-extra-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-debuginfo-common-x86_64-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-devel-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-headers-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-modules-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-modules-extra-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-tools-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-tools-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm\nkernel-tools-libs-4.18.0-193.93.1.el8_2.x86_64.rpm\nperf-4.18.0-193.93.1.el8_2.x86_64.rpm\nperf-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm\npython3-perf-4.18.0-193.93.1.el8_2.x86_64.rpm\npython3-perf-debuginfo-4.18.0-193.93.1.el8_2.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2022-2588\nhttps://access.redhat.com/security/cve/CVE-2022-21123\nhttps://access.redhat.com/security/cve/CVE-2022-21125\nhttps://access.redhat.com/security/cve/CVE-2022-21166\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2022 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nZPiXszO1jjc=k0bc\n-----END PGP SIGNATURE-----\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n. Description:\n\nRed Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments. \n\nThis advisory contains the container images for Red Hat OpenShift Container\nPlatform 4.8.53. See the following advisory for the RPM packages for this\nrelease:\n\nhttps://access.redhat.com/errata/RHBA-2022:7873\n\nSpace precludes documenting all of the container images in this advisory. \nSee the following Release Notes documentation, which will be updated\nshortly for this release, for details about these changes:\n\nhttps://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html\n\nSecurity Fix(es):\n\n* go-getter: command injection vulnerability (CVE-2022-26945)\n* go-getter: unsafe download (issue 1 of 3) (CVE-2022-30321)\n* go-getter: unsafe download (issue 2 of 3) (CVE-2022-30322)\n* go-getter: unsafe download (issue 3 of 3) (CVE-2022-30323)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s)\nlisted in the References section. Solution:\n\nFor OpenShift Container Platform 4.8 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html\n\nYou may download the oc tool and use it to inspect release image metadata\nfor x86_64, s390x, and ppc64le architectures. The image digests\nmay be found at\nhttps://quay.io/repository/openshift-release-dev/ocp-release?tab=tags\n\nThe sha values for the release are:\n\n(For x86_64 architecture)\nThe image digest is\nsha256:ac2bbfa7036c64bbdb44f9a74df3dbafcff1b851d812bf2a48c4fabcac3c7a53\n\n(For s390x architecture)\nThe image digest is\nsha256:ac2c74a664257cea299126d4f789cdf9a5a4efc4a4e8c2361b943374d4eb21e4\n\n(For ppc64le architecture)\nThe image digest is\nsha256:53adc42ed30ad39d7117837dbf5a6db6943a8f0b3b61bc0d046b83394f5c28b2\n\nAll OpenShift Container Platform 4.8 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html\n\n4. Bugs fixed (https://bugzilla.redhat.com/):\n\n2077100 - Console backend check for Web Terminal Operator incorrectly returns HTTP 204\n2092918 - CVE-2022-30321 go-getter: unsafe download (issue 1 of 3)\n2092923 - CVE-2022-30322 go-getter: unsafe download (issue 2 of 3)\n2092925 - CVE-2022-30323 go-getter: unsafe download (issue 3 of 3)\n2092928 - CVE-2022-26945 go-getter: command injection vulnerability\n\n5. JIRA issues fixed (https://issues.jboss.org/):\n\nOCPBUGS-2205 - Prefer local dns does not work expectedly on OCPv4.8\nOCPBUGS-2347 - [cluster-api-provider-baremetal] fix 4.8 build\nOCPBUGS-2577 - [4.8] ETCD Operator goes degraded when a second internal node ip is added\nOCPBUGS-2773 - e2e tests: Installs Red Hat Integration - 3scale operator test is failing due to change of Operator name\nOCPBUGS-2989 - [4.8] cri-o should report the stage of container and pod creation it\u0027s stuck at\n\n6. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. Bugs fixed (https://bugzilla.redhat.com/):\n\n2094982 - CVE-2022-1996 go-restful: Authorization Bypass Through User-Controlled Key\n2130218 - 4.9.7 containers\n\n5",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2022-21166"
      },
      {
        "db": "VULHUB",
        "id": "VHN-406844"
      },
      {
        "db": "PACKETSTORM",
        "id": "168426"
      },
      {
        "db": "PACKETSTORM",
        "id": "169411"
      },
      {
        "db": "PACKETSTORM",
        "id": "169409"
      },
      {
        "db": "PACKETSTORM",
        "id": "168694"
      },
      {
        "db": "PACKETSTORM",
        "id": "169304"
      },
      {
        "db": "PACKETSTORM",
        "id": "170226"
      },
      {
        "db": "PACKETSTORM",
        "id": "169316"
      },
      {
        "db": "PACKETSTORM",
        "id": "169688"
      },
      {
        "db": "PACKETSTORM",
        "id": "169941"
      },
      {
        "db": "PACKETSTORM",
        "id": "169997"
      }
    ],
    "trust": 1.89
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2022-21166",
        "trust": 2.1
      },
      {
        "db": "OPENWALL",
        "id": "OSS-SECURITY/2022/06/16/1",
        "trust": 1.1
      },
      {
        "db": "PACKETSTORM",
        "id": "169688",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "169941",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "169997",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "168694",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "170226",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "167785",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "169719",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "168294",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "169690",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "168021",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "168018",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "168503",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "169695",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "168076",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "168461",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "167862",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "167549",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "168364",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "167692",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "167545",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "168355",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "167553",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-406844",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "168426",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "169411",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "169409",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "169304",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "169316",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-406844"
      },
      {
        "db": "PACKETSTORM",
        "id": "168426"
      },
      {
        "db": "PACKETSTORM",
        "id": "169411"
      },
      {
        "db": "PACKETSTORM",
        "id": "169409"
      },
      {
        "db": "PACKETSTORM",
        "id": "168694"
      },
      {
        "db": "PACKETSTORM",
        "id": "169304"
      },
      {
        "db": "PACKETSTORM",
        "id": "170226"
      },
      {
        "db": "PACKETSTORM",
        "id": "169316"
      },
      {
        "db": "PACKETSTORM",
        "id": "169688"
      },
      {
        "db": "PACKETSTORM",
        "id": "169941"
      },
      {
        "db": "PACKETSTORM",
        "id": "169997"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-21166"
      }
    ]
  },
  "id": "VAR-202206-1157",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-406844"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2025-12-22T22:28:05.116000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-459",
        "trust": 1.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-406844"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-21166"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.1,
        "url": "https://security.netapp.com/advisory/ntap-20220624-0008/"
      },
      {
        "trust": 1.1,
        "url": "https://www.debian.org/security/2022/dsa-5173"
      },
      {
        "trust": 1.1,
        "url": "https://www.debian.org/security/2022/dsa-5178"
      },
      {
        "trust": 1.1,
        "url": "https://www.debian.org/security/2022/dsa-5184"
      },
      {
        "trust": 1.1,
        "url": "https://security.gentoo.org/glsa/202208-23"
      },
      {
        "trust": 1.1,
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html"
      },
      {
        "trust": 1.1,
        "url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.openwall.com/lists/oss-security/2022/06/16/1"
      },
      {
        "trust": 1.0,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-21166"
      },
      {
        "trust": 1.0,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-21123"
      },
      {
        "trust": 1.0,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-21125"
      },
      {
        "trust": 1.0,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/t4p2kjyl74kglhe4jzetvw7pzh6ziaba/"
      },
      {
        "trust": 1.0,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/fhtew3rxu2gw6s3rcpqg4vnczgi3tosv/"
      },
      {
        "trust": 1.0,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/rkrxz4lhgcgmog24zcejny6r2bts4s2q/"
      },
      {
        "trust": 1.0,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/mcvomhbqrh4kp7in6u24cw7f2d2l5kbs/"
      },
      {
        "trust": 0.8,
        "url": "https://access.redhat.com/security/cve/cve-2022-21123"
      },
      {
        "trust": 0.8,
        "url": "https://access.redhat.com/security/team/contact/"
      },
      {
        "trust": 0.8,
        "url": "https://access.redhat.com/security/cve/cve-2022-21166"
      },
      {
        "trust": 0.8,
        "url": "https://access.redhat.com/security/cve/cve-2022-21125"
      },
      {
        "trust": 0.8,
        "url": "https://bugzilla.redhat.com/):"
      },
      {
        "trust": 0.8,
        "url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce"
      },
      {
        "trust": 0.7,
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/security/cve/cve-2022-2588"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/articles/11258"
      },
      {
        "trust": 0.6,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-2588"
      },
      {
        "trust": 0.5,
        "url": "https://access.redhat.com/security/team/key/"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2021-45486"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-45486"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2021-45485"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-45485"
      },
      {
        "trust": 0.2,
        "url": "https://www.debian.org/security/faq"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-23816"
      },
      {
        "trust": 0.2,
        "url": "https://www.debian.org/security/"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-23825"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-29900"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2022-41974"
      },
      {
        "trust": 0.1,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/t4p2kjyl74kglhe4jzetvw7pzh6ziaba/"
      },
      {
        "trust": 0.1,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/rkrxz4lhgcgmog24zcejny6r2bts4s2q/"
      },
      {
        "trust": 0.1,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/fhtew3rxu2gw6s3rcpqg4vnczgi3tosv/"
      },
      {
        "trust": 0.1,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/mcvomhbqrh4kp7in6u24cw7f2d2l5kbs/"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-0391"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-20107"
      },
      {
        "trust": 0.1,
        "url": "https://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-34903"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2022:6536"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-38561"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-21698"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2015-20107"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2022:6537"
      },
      {
        "trust": 0.1,
        "url": "https://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-0391"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-21698"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-34903"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-38561"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2022:6991"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2022:6983"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2022:6872"
      },
      {
        "trust": 0.1,
        "url": "https://security-tracker.debian.org/tracker/xen"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26363"
      },
      {
        "trust": 0.1,
        "url": "https://xenbits.xen.org/xsa/advisory-407.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26364"
      },
      {
        "trust": 0.1,
        "url": "https://xenbits.xen.org/xsa/advisory-404.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26362"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2022:8973"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-1158"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/solutions/6971358"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-43945"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-29900"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-23825"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-1158"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-26373"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-29901"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-2639"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-29901"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-2639"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-43945"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-23816"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26373"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-2959"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-2959"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-21151"
      },
      {
        "trust": 0.1,
        "url": "https://security-tracker.debian.org/tracker/intel-microcode"
      },
      {
        "trust": 0.1,
        "url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-21127"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2022:7279"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-30322"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-21626"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-21626"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-30322"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-30321"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-21628"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2022:7874"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-39399"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-30321"
      },
      {
        "trust": 0.1,
        "url": "https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-21619"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26945"
      },
      {
        "trust": 0.1,
        "url": "https://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-21618"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-21624"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-21624"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-21618"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhba-2022:7873"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-21628"
      },
      {
        "trust": 0.1,
        "url": "https://issues.jboss.org/):"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-21619"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-30323"
      },
      {
        "trust": 0.1,
        "url": "https://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-26945"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-40674"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38177"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-40674"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-1996"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-1996"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41974"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2022:8609"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-3515"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-3515"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-38177"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-38178"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38178"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-406844"
      },
      {
        "db": "PACKETSTORM",
        "id": "168426"
      },
      {
        "db": "PACKETSTORM",
        "id": "169411"
      },
      {
        "db": "PACKETSTORM",
        "id": "169409"
      },
      {
        "db": "PACKETSTORM",
        "id": "168694"
      },
      {
        "db": "PACKETSTORM",
        "id": "169304"
      },
      {
        "db": "PACKETSTORM",
        "id": "170226"
      },
      {
        "db": "PACKETSTORM",
        "id": "169316"
      },
      {
        "db": "PACKETSTORM",
        "id": "169688"
      },
      {
        "db": "PACKETSTORM",
        "id": "169941"
      },
      {
        "db": "PACKETSTORM",
        "id": "169997"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-21166"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-406844"
      },
      {
        "db": "PACKETSTORM",
        "id": "168426"
      },
      {
        "db": "PACKETSTORM",
        "id": "169411"
      },
      {
        "db": "PACKETSTORM",
        "id": "169409"
      },
      {
        "db": "PACKETSTORM",
        "id": "168694"
      },
      {
        "db": "PACKETSTORM",
        "id": "169304"
      },
      {
        "db": "PACKETSTORM",
        "id": "170226"
      },
      {
        "db": "PACKETSTORM",
        "id": "169316"
      },
      {
        "db": "PACKETSTORM",
        "id": "169688"
      },
      {
        "db": "PACKETSTORM",
        "id": "169941"
      },
      {
        "db": "PACKETSTORM",
        "id": "169997"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-21166"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2022-06-15T00:00:00",
        "db": "VULHUB",
        "id": "VHN-406844"
      },
      {
        "date": "2022-09-20T13:59:11",
        "db": "PACKETSTORM",
        "id": "168426"
      },
      {
        "date": "2022-10-18T22:30:59",
        "db": "PACKETSTORM",
        "id": "169411"
      },
      {
        "date": "2022-10-18T22:30:43",
        "db": "PACKETSTORM",
        "id": "169409"
      },
      {
        "date": "2022-10-11T16:07:13",
        "db": "PACKETSTORM",
        "id": "168694"
      },
      {
        "date": "2022-07-28T19:12:00",
        "db": "PACKETSTORM",
        "id": "169304"
      },
      {
        "date": "2022-12-14T15:49:10",
        "db": "PACKETSTORM",
        "id": "170226"
      },
      {
        "date": "2022-07-28T19:12:00",
        "db": "PACKETSTORM",
        "id": "169316"
      },
      {
        "date": "2022-11-02T14:59:50",
        "db": "PACKETSTORM",
        "id": "169688"
      },
      {
        "date": "2022-11-18T14:28:39",
        "db": "PACKETSTORM",
        "id": "169941"
      },
      {
        "date": "2022-11-23T15:18:44",
        "db": "PACKETSTORM",
        "id": "169997"
      },
      {
        "date": "2022-06-15T21:15:09.100000",
        "db": "NVD",
        "id": "CVE-2022-21166"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2022-08-19T00:00:00",
        "db": "VULHUB",
        "id": "VHN-406844"
      },
      {
        "date": "2025-05-05T17:17:41.840000",
        "db": "NVD",
        "id": "CVE-2022-21166"
      }
    ]
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Red Hat Security Advisory 2022-6537-01",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "168426"
      }
    ],
    "trust": 0.1
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "overflow, code execution, memory leak",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "170226"
      }
    ],
    "trust": 0.1
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…