Risk | Low |
Patch available | YES |
Number of vulnerabilities | 4 |
CVE-ID | CVE-2022-2588 CVE-2022-21123 CVE-2022-21125 CVE-2022-21166 |
CWE-ID | CWE-415 CWE-200 |
Exploitation vector | Local |
Public exploit | Public exploit code for vulnerability #1 is available. |
Vulnerable software Subscribe |
kernel (Red Hat package) Operating systems & Components / Operating system package or component Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions Operating systems & Components / Operating system package or component |
Vendor | Red Hat Inc. |
This security bulletin contains information about 4 vulnerabilities.
EUVDB-ID: #VU66397
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-2588
CWE-ID:
CWE-415 - Double Free
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The
vulnerability exists due to a double free error within the network packet scheduler implementation
in the route4_change() function in Linux kernel when removing all references to a route filter
before freeing it. A local user can run a specially crafted program to
crash the kernel or execute arbitrary code.
Install updates from vendor's website.
kernel (Red Hat package): 4.18.0-147.0.2.el8_1 - 4.18.0-147.70.1.el8_1
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 8.1
http://access.redhat.com/errata/RHSA-2022:6872
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU64364
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-21123
CWE-ID:
CWE-200 - Information Exposure
Exploit availability: No
DescriptionThe vulnerability allows an attacker to gain access to potentially sensitive information.
The vulnerability exists in Intel processors due to excessive data output when DirectPath I/O (PCI-Passthrough) is utilized. An attacker (both local and remote) with administrative access to a virtual machine that has an attached DirectPath I/O (PCI-Passthrough) device can obtain information stored in physical memory about the hypervisor or other virtual machines that reside on the same host.
Install updates from vendor's website.
kernel (Red Hat package): 4.18.0-147.0.2.el8_1 - 4.18.0-147.70.1.el8_1
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 8.1
http://access.redhat.com/errata/RHSA-2022:6872
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU64365
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-21125
CWE-ID:
CWE-200 - Information Exposure
Exploit availability: No
DescriptionThe vulnerability allows an attacker to gain access to potentially sensitive information.
The vulnerability exists in Intel processors due to excessive data output when DirectPath I/O (PCI-Passthrough) is utilized. An attacker (both local and remote) with administrative access to a virtual machine that has an attached DirectPath I/O (PCI-Passthrough) device can obtain information stored in physical memory about the hypervisor or other virtual machines that reside on the same host.
Install updates from vendor's website.
kernel (Red Hat package): 4.18.0-147.0.2.el8_1 - 4.18.0-147.70.1.el8_1
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 8.1
http://access.redhat.com/errata/RHSA-2022:6872
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU64366
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-21166
CWE-ID:
CWE-200 - Information Exposure
Exploit availability: No
DescriptionThe vulnerability allows an attacker to gain access to potentially sensitive information.
The vulnerability exists in Intel processors due to excessive data output when DirectPath I/O (PCI-Passthrough) is utilized. An attacker (both local and remote) with administrative access to a virtual machine that has an attached DirectPath I/O (PCI-Passthrough) device can obtain information stored in physical memory about the hypervisor or other virtual machines that reside on the same host.
MitigationInstall updates from vendor's website.
kernel (Red Hat package): 4.18.0-147.0.2.el8_1 - 4.18.0-147.70.1.el8_1
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 8.1
http://access.redhat.com/errata/RHSA-2022:6872
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?