KGDB and KDB allow read and write access to kernel memory, and thus should be restricted during lockdown. An attacker with access to a serial port could trigger the debugger so it is important that the debugger respect the lockdown mode when/if it is triggered. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DSA-5161-1 | linux security update |
![]() |
EUVD-2022-26723 | KGDB and KDB allow read and write access to kernel memory, and thus should be restricted during lockdown. An attacker with access to a serial port could trigger the debugger so it is important that the debugger respect the lockdown mode when/if it is triggered. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). |
![]() |
USN-5465-1 | Linux kernel vulnerabilities |
![]() |
USN-5466-1 | Linux kernel vulnerabilities |
![]() |
USN-5467-1 | Linux kernel vulnerabilities |
![]() |
USN-5468-1 | Linux kernel vulnerabilities |
![]() |
USN-5469-1 | Linux kernel vulnerabilities |
![]() |
USN-5470-1 | Linux kernel (OEM) vulnerabilities |
![]() |
USN-5471-1 | Linux kernel (OEM) vulnerabilities |
![]() |
USN-5484-1 | Linux kernel vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 15 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Tue, 24 Sep 2024 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: oracle
Published:
Updated: 2024-09-24T20:05:11.047Z
Reserved: 2021-11-15T00:00:00
Link: CVE-2022-21499

Updated: 2024-08-03T02:46:39.071Z

Status : Modified
Published: 2022-06-09T21:15:07.657
Modified: 2024-11-21T06:44:50.557
Link: CVE-2022-21499


No data.