Metrics
No CVSS v4.0
Attack Vector Local
Attack Complexity Low
Privileges Required Low
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
User Interaction None
No CVSS v3.0
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
This CVE is not in the KEV list.
The EPSS score is 0.00042.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Fedoraproject
Subscribe
|
Fedora
Subscribe
|
|
Linux
Subscribe
|
Linux Kernel
Subscribe
|
|
Netapp
Subscribe
|
H300e
Subscribe
H300e Firmware
Subscribe
H300s
Subscribe
H300s Firmware
Subscribe
H410c
Subscribe
H410c Firmware
Subscribe
H410s
Subscribe
H410s Firmware
Subscribe
H500e
Subscribe
H500e Firmware
Subscribe
H500s
Subscribe
H500s Firmware
Subscribe
H700e
Subscribe
H700e Firmware
Subscribe
H700s
Subscribe
H700s Firmware
Subscribe
|
|
Redhat
Subscribe
|
3scale Api Management
Subscribe
Codeready Linux Builder
Subscribe
Codeready Linux Builder Eus
Subscribe
Codeready Linux Builder Eus For Power Little Endian
Subscribe
Codeready Linux Builder For Power Little Endian Eus
Subscribe
Developer Tools
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Desktop
Subscribe
Enterprise Linux Eus
Subscribe
Enterprise Linux For Ibm Z Systems
Subscribe
Enterprise Linux For Ibm Z Systems Eus
Subscribe
Enterprise Linux For Power Big Endian
Subscribe
Enterprise Linux For Power Little Endian
Subscribe
Enterprise Linux For Power Little Endian Eus
Subscribe
Enterprise Linux For Real Time
Subscribe
Enterprise Linux For Real Time For Nfv
Subscribe
Enterprise Linux For Real Time For Nfv Tus
Subscribe
Enterprise Linux For Real Time Tus
Subscribe
Enterprise Linux For Scientific Computing
Subscribe
Enterprise Linux Server
Subscribe
Enterprise Linux Server Aus
Subscribe
Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions
Subscribe
Enterprise Linux Server Tus
Subscribe
Enterprise Linux Server Update Services For Sap Solutions
Subscribe
Enterprise Linux Workstation
Subscribe
Ovirt-node
Subscribe
Rhel Aus
Subscribe
Rhel E4s
Subscribe
Rhel Eus
Subscribe
Rhel Extras Rt
Subscribe
Rhel Tus
Subscribe
Rhev Hypervisor
Subscribe
Virtualization
Subscribe
Virtualization Host
Subscribe
|
Configuration 1 [-]
|
Configuration 2 [-]
|
Configuration 3 [-]
| AND |
|
Configuration 4 [-]
| AND |
|
Configuration 5 [-]
| AND |
|
Configuration 6 [-]
|
Configuration 7 [-]
|
Configuration 8 [-]
| AND |
|
Configuration 9 [-]
| AND |
|
Configuration 10 [-]
| AND |
|
Configuration 11 [-]
| AND |
|
Configuration 12 [-]
| AND |
|
Configuration 13 [-]
| AND |
|
Configuration 14 [-]
| AND |
|
Configuration 15 [-]
| AND |
|
| Package | CPE | Advisory | Released Date |
|---|---|---|---|
| Red Hat Enterprise Linux 7 | |||
| kernel-rt-0:3.10.0-1160.59.1.rt56.1200.el7 | cpe:/a:redhat:rhel_extras_rt:7 | RHSA-2022:0622 | 2022-02-22T00:00:00Z |
| kpatch-patch | cpe:/o:redhat:enterprise_linux:7 | RHSA-2022:0592 | 2022-02-22T00:00:00Z |
| kernel-0:3.10.0-1160.59.1.el7 | cpe:/o:redhat:enterprise_linux:7 | RHSA-2022:0620 | 2022-02-22T00:00:00Z |
| Red Hat Enterprise Linux 7.3 Advanced Update Support | |||
| kernel-0:3.10.0-514.99.1.el7 | cpe:/o:redhat:rhel_aus:7.3 | RHSA-2022:1106 | 2022-03-29T00:00:00Z |
| Red Hat Enterprise Linux 7.4 Advanced Update Support | |||
| kernel-0:3.10.0-693.99.1.el7 | cpe:/o:redhat:rhel_aus:7.4 | RHSA-2022:1104 | 2022-03-29T00:00:00Z |
| Red Hat Enterprise Linux 7.6 Advanced Update Support(Disable again in 2026 - SPRHEL-7118) | |||
| kernel-0:3.10.0-957.92.1.el7 | cpe:/o:redhat:rhel_aus:7.6 | RHSA-2022:1107 | 2022-03-29T00:00:00Z |
| Red Hat Enterprise Linux 7.6 Telco Extended Update Support | |||
| kernel-0:3.10.0-957.92.1.el7 | cpe:/o:redhat:rhel_tus:7.6 | RHSA-2022:1107 | 2022-03-29T00:00:00Z |
| Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions | |||
| kpatch-patch | cpe:/o:redhat:rhel_e4s:7.6 | RHSA-2022:1103 | 2022-03-29T00:00:00Z |
| kernel-0:3.10.0-957.92.1.el7 | cpe:/o:redhat:rhel_e4s:7.6 | RHSA-2022:1107 | 2022-03-29T00:00:00Z |
| Red Hat Enterprise Linux 7.7 Advanced Update Support | |||
| kernel-0:3.10.0-1062.63.1.el7 | cpe:/o:redhat:rhel_aus:7.7 | RHSA-2022:0712 | 2022-03-01T00:00:00Z |
| Red Hat Enterprise Linux 7.7 Telco Extended Update Support | |||
| kernel-0:3.10.0-1062.63.1.el7 | cpe:/o:redhat:rhel_tus:7.7 | RHSA-2022:0712 | 2022-03-01T00:00:00Z |
| Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions | |||
| kernel-0:3.10.0-1062.63.1.el7 | cpe:/o:redhat:rhel_e4s:7.7 | RHSA-2022:0712 | 2022-03-01T00:00:00Z |
| kpatch-patch | cpe:/o:redhat:rhel_e4s:7.7 | RHSA-2022:0718 | 2022-03-01T00:00:00Z |
| Red Hat Enterprise Linux 8 | |||
| kernel-rt-0:4.18.0-348.20.1.rt7.150.el8_5 | cpe:/a:redhat:enterprise_linux:8::nfv | RHSA-2022:0819 | 2022-03-10T00:00:00Z |
| kernel-0:4.18.0-348.20.1.el8_5 | cpe:/o:redhat:enterprise_linux:8 | RHSA-2022:0825 | 2022-03-10T00:00:00Z |
| kpatch-patch | cpe:/o:redhat:enterprise_linux:8 | RHSA-2022:0849 | 2022-03-14T00:00:00Z |
| Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions | |||
| kernel-0:4.18.0-147.64.1.el8_1 | cpe:/o:redhat:rhel_e4s:8.1 | RHSA-2022:0823 | 2022-03-10T00:00:00Z |
| kpatch-patch | cpe:/o:redhat:rhel_e4s:8.1 | RHSA-2022:0851 | 2022-03-14T00:00:00Z |
| kpatch-patch | cpe:/o:redhat:rhel_e4s:8.1 | RHSA-2022:0958 | 2022-03-17T00:00:00Z |
| Red Hat Enterprise Linux 8.2 Extended Update Support | |||
| kernel-rt-0:4.18.0-193.79.1.rt13.129.el8_2 | cpe:/a:redhat:rhel_eus:8.2::nfv | RHSA-2022:0821 | 2022-03-10T00:00:00Z |
| kernel-0:4.18.0-193.79.1.el8_2 | cpe:/o:redhat:rhel_eus:8.2 | RHSA-2022:0820 | 2022-03-10T00:00:00Z |
| kpatch-patch | cpe:/o:redhat:rhel_eus:8.2 | RHSA-2022:0925 | 2022-03-15T00:00:00Z |
| Red Hat Enterprise Linux 8.4 Extended Update Support | |||
| kernel-rt-0:4.18.0-305.40.1.rt7.112.el8_4 | cpe:/a:redhat:rhel_eus:8.4::nfv | RHSA-2022:0771 | 2022-03-08T00:00:00Z |
| kpatch-patch | cpe:/o:redhat:rhel_eus:8.4 | RHSA-2022:0772 | 2022-03-08T00:00:00Z |
| kernel-0:4.18.0-305.40.1.el8_4 | cpe:/o:redhat:rhel_eus:8.4 | RHSA-2022:0777 | 2022-03-08T00:00:00Z |
| Red Hat Virtualization 4 for Red Hat Enterprise Linux 7 | |||
| redhat-virtualization-host-0:4.3.22-20220330.1.el7_9 | cpe:/o:redhat:enterprise_linux:7::hypervisor | RHSA-2022:1263 | 2022-04-07T00:00:00Z |
| Red Hat Virtualization 4 for Red Hat Enterprise Linux 8 | |||
| redhat-virtualization-host-0:4.4.10-202203101736_8.5 | cpe:/o:redhat:rhev_hypervisor:4.4::el8 | RHSA-2022:0841 | 2022-03-14T00:00:00Z |
No data.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2940-1 | linux security update |
Debian DLA |
DLA-2941-1 | linux-4.19 security update |
Debian DSA |
DSA-5092-1 | linux security update |
Debian DSA |
DSA-5096-1 | linux security update |
EUVD |
EUVD-2022-15497 | A random memory access flaw was found in the Linux kernel's GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system. |
Ubuntu USN |
USN-5278-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-5294-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5294-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5295-1 | Linux kernel (HWE) vulnerabilities |
Ubuntu USN |
USN-5295-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5297-1 | Linux kernel (GKE) vulnerabilities |
Ubuntu USN |
USN-5298-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5362-1 | Linux kernel (Intel IOTG) vulnerabilities |
Ubuntu USN |
USN-5505-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5513-1 | Linux kernel (AWS) vulnerabilities |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-02T23:25:40.079Z
Reserved: 2022-01-21T00:00:00
Link: CVE-2022-0330
No data.
Status : Modified
Published: 2022-03-25T19:15:10.027
Modified: 2024-11-21T06:38:23.467
Link: CVE-2022-0330
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN