First published: Wed May 25 2022(Updated: )
A flaw was found in hw. Incomplete cleanup in specific special register write operations for some Intel® Processors may allow an authenticated user to enable information disclosure via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:3.10.0-1160.76.1.rt56.1220.el7 | 0:3.10.0-1160.76.1.rt56.1220.el7 |
redhat/kernel | <0:3.10.0-1160.76.1.el7 | 0:3.10.0-1160.76.1.el7 |
redhat/kernel-rt | <0:4.18.0-372.26.1.rt7.183.el8_6 | 0:4.18.0-372.26.1.rt7.183.el8_6 |
redhat/kernel | <0:4.18.0-372.26.1.el8_6 | 0:4.18.0-372.26.1.el8_6 |
redhat/kernel | <0:4.18.0-147.76.1.el8_1 | 0:4.18.0-147.76.1.el8_1 |
redhat/kernel | <0:4.18.0-193.93.1.el8_2 | 0:4.18.0-193.93.1.el8_2 |
redhat/kernel-rt | <0:4.18.0-193.93.1.rt13.143.el8_2 | 0:4.18.0-193.93.1.rt13.143.el8_2 |
redhat/kernel-rt | <0:4.18.0-305.65.1.rt7.137.el8_4 | 0:4.18.0-305.65.1.rt7.137.el8_4 |
redhat/kernel | <0:4.18.0-305.65.1.el8_4 | 0:4.18.0-305.65.1.el8_4 |
redhat/kernel | <0:5.14.0-162.6.1.el9_1 | 0:5.14.0-162.6.1.el9_1 |
redhat/kernel-rt | <0:5.14.0-162.6.1.rt21.168.el9_1 | 0:5.14.0-162.6.1.rt21.168.el9_1 |
redhat/kernel | <0:5.14.0-70.36.1.el9_0 | 0:5.14.0-70.36.1.el9_0 |
redhat/kernel-rt | <0:5.14.0-70.36.1.rt21.108.el9_0 | 0:5.14.0-70.36.1.rt21.108.el9_0 |
debian/intel-microcode | 3.20240813.1~deb11u1 3.20241112.1~deb11u1 3.20241112.1~deb12u1 3.20231114.1~deb12u1 3.20241112.1 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.10-1 6.12.11-1 | |
debian/xen | 4.14.6-1 4.14.5+94-ge49571868d-1 4.17.3+10-g091466ba55-1~deb12u1 4.17.5+23-ga4e5191dc0-1 4.19.1-1 | |
Xen xen-unstable | ||
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Intel sgx dcap linux | <1.14.100.3 | |
Intel sgx dcap windows | <1.14.100.3 | |
Intel sgx psw windows | <2.16.100.3 | |
Intel sgx psw linux | <2.17.100.3 | |
Intel sgx sdk windows | <2.16.100.3 | |
Intel sgx sdk linux | <2.17.100.3 | |
VMware ESXi | =7.0 | |
VMware ESXi | =7.0-beta | |
VMware ESXi | =7.0-update_1 | |
VMware ESXi | =7.0-update_1a | |
VMware ESXi | =7.0-update_1b | |
VMware ESXi | =7.0-update_1c | |
VMware ESXi | =7.0-update_1d | |
VMware ESXi | =7.0-update_2 | |
VMware ESXi | =7.0-update_2a | |
VMware ESXi | =7.0-update_2c | |
VMware ESXi | =7.0-update_2d | |
VMware ESXi | =7.0-update_3c | |
VMware ESXi | =7.0-update_3d | |
Debian GNU/Linux | =9.0 | |
Debian GNU/Linux | =10.0 | |
Debian GNU/Linux | =11.0 |
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-21166 is considered a medium severity vulnerability due to potential information disclosure risks.
To fix CVE-2022-21166, ensure that you update to the latest kernel versions provided by Red Hat as specified in the advisory.
CVE-2022-21166 affects certain Intel processors and may impact systems running specific versions of the Red Hat kernel.
CVE-2022-21166 can potentially allow an authenticated user to gain access to sensitive information due to incomplete cleanup processes.
CVE-2022-21166 is not remotely exploitable as it requires local authenticated access to the affected systems.