First published: Wed May 25 2022(Updated: )
A flaw was found in hw. Incomplete cleanup of multi-core shared buffers for some Intel® Processors may allow an authenticated user to enable information disclosure via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:3.10.0-1160.76.1.rt56.1220.el7 | 0:3.10.0-1160.76.1.rt56.1220.el7 |
redhat/kernel | <0:3.10.0-1160.76.1.el7 | 0:3.10.0-1160.76.1.el7 |
redhat/kernel-rt | <0:4.18.0-372.26.1.rt7.183.el8_6 | 0:4.18.0-372.26.1.rt7.183.el8_6 |
redhat/kernel | <0:4.18.0-372.26.1.el8_6 | 0:4.18.0-372.26.1.el8_6 |
redhat/kernel | <0:4.18.0-147.76.1.el8_1 | 0:4.18.0-147.76.1.el8_1 |
redhat/kernel | <0:4.18.0-193.93.1.el8_2 | 0:4.18.0-193.93.1.el8_2 |
redhat/kernel-rt | <0:4.18.0-193.93.1.rt13.143.el8_2 | 0:4.18.0-193.93.1.rt13.143.el8_2 |
redhat/kernel-rt | <0:4.18.0-305.65.1.rt7.137.el8_4 | 0:4.18.0-305.65.1.rt7.137.el8_4 |
redhat/kernel | <0:4.18.0-305.65.1.el8_4 | 0:4.18.0-305.65.1.el8_4 |
redhat/kernel | <0:5.14.0-162.6.1.el9_1 | 0:5.14.0-162.6.1.el9_1 |
redhat/kernel-rt | <0:5.14.0-162.6.1.rt21.168.el9_1 | 0:5.14.0-162.6.1.rt21.168.el9_1 |
redhat/kernel | <0:5.14.0-70.36.1.el9_0 | 0:5.14.0-70.36.1.el9_0 |
redhat/kernel-rt | <0:5.14.0-70.36.1.rt21.108.el9_0 | 0:5.14.0-70.36.1.rt21.108.el9_0 |
Xen XAPI | ||
Fedora | =35 | |
Fedora | =36 | |
Intel SGX DCAP for Linux | <1.14.100.3 | |
Makves DCAP | <1.14.100.3 | |
Intel SGX Platform Software (PSW) | <2.16.100.3 | |
Intel SGX PSW | <2.17.100.3 | |
Intel SGX SDK for Windows | <2.16.100.3 | |
Intel SGX SDK for Linux | <2.17.100.3 | |
VMware ESXi | =7.0 | |
VMware ESXi | =7.0-beta | |
VMware ESXi | =7.0-update_1 | |
VMware ESXi | =7.0-update_1a | |
VMware ESXi | =7.0-update_1b | |
VMware ESXi | =7.0-update_1c | |
VMware ESXi | =7.0-update_1d | |
VMware ESXi | =7.0-update_2 | |
VMware ESXi | =7.0-update_2a | |
VMware ESXi | =7.0-update_2c | |
VMware ESXi | =7.0-update_2d | |
VMware ESXi | =7.0-update_3c | |
VMware ESXi | =7.0-update_3d | |
Debian | =9.0 | |
Debian | =10.0 | |
Debian | =11.0 | |
debian/intel-microcode | 3.20240813.1~deb11u1 3.20241112.1~deb11u1 3.20241112.1~deb12u1 3.20231114.1~deb12u1 3.20250211.1 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 | |
debian/xen | 4.14.6-1 4.14.5+94-ge49571868d-1 4.17.3+10-g091466ba55-1~deb12u1 4.17.5+23-ga4e5191dc0-1 4.19.1-1 4.20.0-1 |
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-21123 is classified as a moderate severity vulnerability.
To fix CVE-2022-21123, update to the latest kernel versions provided by your distribution, such as 0:3.10.0-1160.76.1.rt56.1220.el7 or equivalent for your system.
CVE-2022-21123 affects certain Intel processors and systems running specific kernel versions.
CVE-2022-21123 can lead to information disclosure through local access by authenticated users.
Affected software versions include specific Red Hat kernels, Debian kernel packages, and Intel microcode versions listed in the vulnerability details.