First published: Wed May 25 2022(Updated: )
A flaw was found in hw. Incomplete cleanup of multi-core shared buffers for some Intel® Processors may allow an authenticated user to enable information disclosure via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:3.10.0-1160.76.1.rt56.1220.el7 | 0:3.10.0-1160.76.1.rt56.1220.el7 |
redhat/kernel | <0:3.10.0-1160.76.1.el7 | 0:3.10.0-1160.76.1.el7 |
redhat/kernel-rt | <0:4.18.0-372.26.1.rt7.183.el8_6 | 0:4.18.0-372.26.1.rt7.183.el8_6 |
redhat/kernel | <0:4.18.0-372.26.1.el8_6 | 0:4.18.0-372.26.1.el8_6 |
redhat/kernel | <0:4.18.0-147.76.1.el8_1 | 0:4.18.0-147.76.1.el8_1 |
redhat/kernel | <0:4.18.0-193.93.1.el8_2 | 0:4.18.0-193.93.1.el8_2 |
redhat/kernel-rt | <0:4.18.0-193.93.1.rt13.143.el8_2 | 0:4.18.0-193.93.1.rt13.143.el8_2 |
redhat/kernel-rt | <0:4.18.0-305.65.1.rt7.137.el8_4 | 0:4.18.0-305.65.1.rt7.137.el8_4 |
redhat/kernel | <0:4.18.0-305.65.1.el8_4 | 0:4.18.0-305.65.1.el8_4 |
redhat/kernel | <0:5.14.0-162.6.1.el9_1 | 0:5.14.0-162.6.1.el9_1 |
redhat/kernel-rt | <0:5.14.0-162.6.1.rt21.168.el9_1 | 0:5.14.0-162.6.1.rt21.168.el9_1 |
redhat/kernel | <0:5.14.0-70.36.1.el9_0 | 0:5.14.0-70.36.1.el9_0 |
redhat/kernel-rt | <0:5.14.0-70.36.1.rt21.108.el9_0 | 0:5.14.0-70.36.1.rt21.108.el9_0 |
debian/intel-microcode | 3.20240813.1~deb11u1 3.20241112.1~deb11u1 3.20241112.1~deb12u1 3.20231114.1~deb12u1 3.20241112.1 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.11-1 6.12.12-1 | |
debian/xen | 4.14.6-1 4.14.5+94-ge49571868d-1 4.17.3+10-g091466ba55-1~deb12u1 4.17.5+23-ga4e5191dc0-1 4.19.1-1 | |
Xen xen-unstable | ||
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Intel sgx dcap linux | <1.14.100.3 | |
Intel sgx dcap windows | <1.14.100.3 | |
Intel sgx psw windows | <2.16.100.3 | |
Intel sgx psw linux | <2.17.100.3 | |
Intel sgx sdk windows | <2.16.100.3 | |
Intel sgx sdk linux | <2.17.100.3 | |
VMware ESXi | =7.0 | |
VMware ESXi | =7.0-beta | |
VMware ESXi | =7.0-update_1 | |
VMware ESXi | =7.0-update_1a | |
VMware ESXi | =7.0-update_1b | |
VMware ESXi | =7.0-update_1c | |
VMware ESXi | =7.0-update_1d | |
VMware ESXi | =7.0-update_2 | |
VMware ESXi | =7.0-update_2a | |
VMware ESXi | =7.0-update_2c | |
VMware ESXi | =7.0-update_2d | |
VMware ESXi | =7.0-update_3c | |
VMware ESXi | =7.0-update_3d | |
Debian GNU/Linux | =9.0 | |
Debian GNU/Linux | =10.0 | |
Debian GNU/Linux | =11.0 |
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-21123 is classified as a moderate severity vulnerability.
To fix CVE-2022-21123, update to the latest kernel versions provided by your distribution, such as 0:3.10.0-1160.76.1.rt56.1220.el7 or equivalent for your system.
CVE-2022-21123 affects certain Intel processors and systems running specific kernel versions.
CVE-2022-21123 can lead to information disclosure through local access by authenticated users.
Affected software versions include specific Red Hat kernels, Debian kernel packages, and Intel microcode versions listed in the vulnerability details.