{"containers":{"cna":{"affected":[{"product":"Oracle Linux","vendor":"Oracle Corporation","versions":[{"status":"affected","version":"Oracle Linux: 6"},{"status":"affected","version":"Oracle Linux: 7"},{"status":"affected","version":"Oracle Linux: 8"}]},{"product":"Oracle VM","vendor":"Oracle Corporation","versions":[{"status":"affected","version":"Oracle VM: 3"}]}],"descriptions":[{"lang":"en","value":"KGDB and KDB allow read and write access to kernel memory, and thus should be restricted during lockdown. An attacker with access to a serial port could trigger the debugger so it is important that the debugger respect the lockdown mode when/if it is triggered. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":6.7,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"description":"KGDB and KDB allow read and write access to kernel memory, and thus should be restricted during lockdown.  An attacker with access to a serial port could trigger the debugger so it is important that the debugger respect the lockdown mode when/if it is triggered.  CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2022-09-08T20:40:10.000Z","orgId":"43595867-4340-4103-b7a2-9a5208d29a85","shortName":"oracle"},"references":[{"tags":["x_refsource_MISC"],"url":"https://git.kernel.org/linus/eadb2f47a3ced5c64b23b90fd2a3463f63726066"},{"name":"DSA-5161","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"https://www.debian.org/security/2022/dsa-5161"},{"tags":["x_refsource_MISC"],"url":"http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"secalert_us@oracle.com","ID":"CVE-2022-21499","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Oracle Linux","version":{"version_data":[{"version_affected":"=","version_value":"Oracle Linux: 6"},{"version_affected":"=","version_value":"Oracle Linux: 7"},{"version_affected":"=","version_value":"Oracle Linux: 8"}]}},{"product_name":"Oracle VM","version":{"version_data":[{"version_affected":"=","version_value":"Oracle VM: 3"}]}}]},"vendor_name":"Oracle Corporation"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"KGDB and KDB allow read and write access to kernel memory, and thus should be restricted during lockdown. An attacker with access to a serial port could trigger the debugger so it is important that the debugger respect the lockdown mode when/if it is triggered. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)."}]},"impact":{"cvss":{"baseScore":"6.7","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"KGDB and KDB allow read and write access to kernel memory, and thus should be restricted during lockdown.  An attacker with access to a serial port could trigger the debugger so it is important that the debugger respect the lockdown mode when/if it is triggered.  CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)."}]}]},"references":{"reference_data":[{"name":"https://git.kernel.org/linus/eadb2f47a3ced5c64b23b90fd2a3463f63726066","refsource":"MISC","url":"https://git.kernel.org/linus/eadb2f47a3ced5c64b23b90fd2a3463f63726066"},{"name":"DSA-5161","refsource":"DEBIAN","url":"https://www.debian.org/security/2022/dsa-5161"},{"name":"http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html","refsource":"MISC","url":"http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T02:46:39.071Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://git.kernel.org/linus/eadb2f47a3ced5c64b23b90fd2a3463f63726066"},{"name":"DSA-5161","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"https://www.debian.org/security/2022/dsa-5161"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-24T13:49:06.986360Z","id":"CVE-2022-21499","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-24T20:05:11.047Z"}}]},"cveMetadata":{"assignerOrgId":"43595867-4340-4103-b7a2-9a5208d29a85","assignerShortName":"oracle","cveId":"CVE-2022-21499","datePublished":"2022-06-09T20:15:28.000Z","dateReserved":"2021-11-15T00:00:00.000Z","dateUpdated":"2024-09-24T20:05:11.047Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}