CVE-2022-21127

Name
CVE-2022-21127
Description
Incomplete cleanup in specific special register read operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html
MLIST http://www.openwall.com/lists/oss-security/2022/06/16/1
Third Party Advisory https://security.netapp.com/advisory/ntap-20220624-0008/
DEBIAN https://www.debian.org/security/2022/dsa-5178

Match rules

CPE URI Source package Min version Max version
cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:* xen == None == None

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
xen 3.14-main 4.15.4-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
xen 3.15-main 4.15.5-r4 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
xen 3.16-main 4.16.6-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
xen 3.20-main 4.18.3-r1 Natanael Copa <ncopa@alpinelinux.org> fixed
xen 3.19-main 4.18.3-r1 Natanael Copa <ncopa@alpinelinux.org> fixed
xen 3.18-main 4.17.5-r1 Natanael Copa <ncopa@alpinelinux.org> fixed
xen 3.17-main 4.16.6-r2 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
xen edge-main 4.19.0-r0 Natanael Copa <ncopa@alpinelinux.org> fixed