6.7
CVSSv3

CVE-2022-21499

CVSSv4: NA | CVSSv3: 6.7 | CVSSv2: 4.6 | VMScore: 770 | EPSS: 0.00119 | KEV: Not Included
Published: 09/06/2022 Updated: 21/11/2024

Vulnerability Summary

It exists that some Intel processors did not completely perform cleanup actions on multi-core shared buffers. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21123) After a standard system update you need to reboot your computer to make all the necessary changes.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

oracle corporation oracle linux

oracle corporation oracle vm

oracle linux 6

oracle linux 7

oracle linux 8

debian debian linux 11.0

Vendor Advisories

Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks CVE-2022-0494 The scsi_ioctl() was susceptible to an information leak only exploitable by users with CAP_SYS_ADMIN or CAP_SYS_RAWIO capabilities CVE-2022-0854 Ali Haider discovered a pot ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Synopsis Moderate: kernel-rt security and bug fix update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for kernel-rt is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this updat ...
Synopsis Moderate: kernel security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for kernel is now available for Red Hat Enterprise Linux 9Red Hat Product Security has rated th ...
Synopsis Moderate: kernel-rt security and bug fix update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for kernel-rt is now available for Red Hat Enterprise Linux 9Red Hat Product Security has rated this updat ...
Synopsis Moderate: Logging Subsystem 555 - Red Hat OpenShift security update Type/Severity Security Advisory: Moderate Topic Logging Subsystem 555 - Red Hat OpenShiftRed Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severi ...
Synopsis Moderate: Openshift Logging 5314 bug fix release and security update Type/Severity Security Advisory: Moderate Topic Openshift Logging Bug Fix Release (5314)Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severi ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for kernel is now available for Red Hat Enterprise Linux 86 Extended Update SupportRed Hat Product Securit ...
Synopsis Important: Red Hat Advanced Cluster Management 263 security update Type/Severity Security Advisory: Important Topic Red Hat Advanced Cluster Management for Kubernetes 263 GeneralAvailability release images, which provide security updates, fix bugs, and update container imagesRed Hat Product Security has rated this update as havi ...
KGDB and KDB allow read and write access to kernel memory, and thus should be restricted during lockdown An attacker with access to a serial port could trigger the debugger so it is important that the debugger respect the lockdown mode when/if it is triggered CVSS 31 Base Score 65 (Confidentiality, Integrity and Availability impacts) CVSS Vect ...
KGDB and KDB allow read and write access to kernel memory but were not restricted during lockdown ...
Due to the small table perturb size, a memory leak flaw was found in the Linux kernel's TCP source port generation algorithm in the net/ipv4/tcpc function This flaw allows an attacker to leak information and may cause a denial of service (CVE-2022-1012) A use-after-free flaw was found in fs/ext4/nameic:dx_insert_block() in the Linux kernel's fi ...
Due to the small table perturb size, a memory leak flaw was found in the Linux kernel's TCP source port generation algorithm in the net/ipv4/tcpc function This flaw allows an attacker to leak information and may cause a denial of service (CVE-2022-1012) A use-after-free flaw was found in fs/ext4/nameic:dx_insert_block() in the Linux kernel's fi ...
Due to the small table perturb size, a memory leak flaw was found in the Linux kernel's TCP source port generation algorithm in the net/ipv4/tcpc function This flaw allows an attacker to leak information and may cause a denial of service (CVE-2022-1012) A use-after-free flaw was found in fs/ext4/nameic:dx_insert_block() in the Linux kernel's fi ...

Github Repositories

Disabling kernel lockdown on Ubuntu without physical access

unlockdown This repo demonstrates some ways to disable or bypass kernel lockdown on Ubuntu (and some other) kernels without physical access to the machine, essentially bypassing this security feature (Updated 21032020) At this point, all outlined bypass methods have been fixed on Ubuntu, Fedora and Debian (see this for details) The other linked methods might still work St