Bug 2097290

Summary: CVE-2022-24436 hw: cpu: cryptographic leaks via frequency scaling attacks(Intel) [ovirt-4.5]
Product: [oVirt] ovirt-node Reporter: Sandro Bonazzola <sbonazzo>
Component: Included packagesAssignee: Sandro Bonazzola <sbonazzo>
Status: CLOSED NOTABUG QA Contact: cshao <cshao>
Severity: medium Docs Contact:
Priority: low    
Version: 4.5.0.3CC: arachman, bugs, cshao, lsvaty, lveyde, mavital, peyu, sbonazzo, weiwang, yaniwang
Target Milestone: ---Keywords: Security, SecurityTracking
Target Release: ---Flags: sbonazzo: ovirt-4.5-
cshao: testing_ack+
Hardware: x86_64   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: No Doc Update
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-06-16 06:26:58 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: Node RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2097248    
Bug Blocks: 2097184    

Description Sandro Bonazzola 2022-06-15 11:19:57 UTC
This bug was created to ensure that one or more security vulnerabilities are fixed in affected versions of oVirt.

For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.

Comment 1 Sandro Bonazzola 2022-06-16 06:26:58 UTC
RHEL has been reported not affected so as fallback CentOS Stream and oVirt Node are not affected as well.
Closing Not A Bug