First published: Thu Feb 24 2022(Updated: )
A flaw was found in the Linux kernel. Information leak may occur through swiotlb.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-425.3.1.rt7.213.el8 | 0:4.18.0-425.3.1.rt7.213.el8 |
redhat/kernel | <0:4.18.0-425.3.1.el8 | 0:4.18.0-425.3.1.el8 |
redhat/kernel | <0:5.14.0-162.6.1.el9_1 | 0:5.14.0-162.6.1.el9_1 |
redhat/kernel-rt | <0:5.14.0-162.6.1.rt21.168.el9_1 | 0:5.14.0-162.6.1.rt21.168.el9_1 |
Linux Linux kernel | <=5.16 | |
Linux Linux kernel | =5.17 | |
Linux Linux kernel | =5.17-rc1 | |
Linux Linux kernel | =5.17-rc2 | |
Linux Linux kernel | =5.17-rc3 | |
Linux Linux kernel | =5.17-rc4 | |
Linux Linux kernel | =5.17-rc5 | |
Linux Linux kernel | =5.17-rc6 | |
Linux Linux kernel | =5.17-rc7 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
redhat/Linux kernel | <5.17 | 5.17 |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-0854 is a memory leak flaw in the Linux kernel's DMA subsystem that allows a local user to read random memory from the kernel space.
Ubuntu is affected by CVE-2022-0854 if the Linux kernel version is between 5.14.0-1033.36 (inclusive) and 5.14.0-1034.36 (exclusive) on the focal release.
Red Hat is affected by CVE-2022-0854 if the Linux kernel version is between 5.17 (inclusive) and 5.18 (exclusive).
Red Hat Kernel RT is affected by CVE-2022-0854 if the kernel-rt version is 4.18.0-425.3.1.rt7.213.el8 on the el8 release, or if the kernel-rt version is 5.14.0-162.6.1.rt21.168.el9_1 on the el9_1 release.
Debian is affected by CVE-2022-0854 if the Linux kernel version is one of the following: 4.19.249-2, 4.19.289-2, 5.10.178-3, 5.10.191-1, 6.1.38-1, 6.1.52-1, and 6.5.3-1.
CVE-2022-0854 has a severity rating of 5.5 (medium).
The Common Weakness Enumeration (CWE) ID for CVE-2022-0854 is CWE-401.
To fix CVE-2022-0854 on Ubuntu, update the linux-oem-5.14 package to version 5.14.0-1034.36 or later.
To fix CVE-2022-0854 on Red Hat, update the Linux kernel to version 5.18 or later.
To fix CVE-2022-0854 on Red Hat Kernel RT, update the kernel-rt package to version 4.18.0-425.3.1.rt7.213.el8 or 5.14.0-162.6.1.rt21.168.el9_1 or later.
To fix CVE-2022-0854 on Debian, update the linux package to version 4.19.249-2, 4.19.289-2, 5.10.178-3, 5.10.191-1, 6.1.38-1, 6.1.52-1, 6.5.3-1 or later.