Bug 1646768 (CVE-2018-12207)
Summary: | CVE-2018-12207 hw: Machine Check Error on Page Size Change (IFU) | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Wade Mealing <wmealing> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | acaringi, airlied, asavkov, bhu, blc, bmontgom, brdeoliv, bskeggs, chayang, dblechte, dfediuck, dhoward, dvlasenk, eedri, emcnabb, eparis, esammons, eshatokhin, fhrbata, gsuckevi, hdegoede, hkrzesin, iboverma, ichavero, itamar, jarodwilson, jbastian, jburrell, jeremy, jforbes, jglisse, jlelli, jmario, joe.lawrence, john.j5live, jokerman, jonathan, josef, jpoimboe, jross, jshortt, jstancek, jthierry, jwboyer, kernel-maint, kernel-mgr, labbott, lgoncalv, lilu, linville, longman, masami256, matt, mcascell, mchehab, mcressma, mgoldboi, michal.skrivanek, mjenner, mjg59, mlangsdo, mvanderw, nmurray, nstielau, osoukup, pbonzini, plougher, pmatouse, pmyers, ppandit, qzhao, rhandlin, rt-maint, rvrbovsk, sbonazzo, security-response-team, sherold, skontar, sponnaga, steved, vkuznets, williams, wmealing, ycote, ykopkova, yozone, yturgema, zhijwang |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU's local cache and system software's Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.
System software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor's Memory Management Unit (MMU) uses Paging structure entries to translate program's virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.
System software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor's TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-11-13 00:51:11 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1690334, 1690343, 1690344, 1690345, 1690346, 1690347, 1692385, 1692596, 1698408, 1698409, 1698410, 1698411, 1698412, 1698413, 1698414, 1698415, 1698416, 1698417, 1707269, 1733009, 1733010, 1762993, 1766964, 1766965, 1766977, 1766978, 1766987, 1768306, 1768307, 1768308, 1768309, 1771645, 1779250 | ||
Bug Blocks: | 1709291, 1750329, 1750330, 1750331, 1750332, 1750333, 1750334, 1752312 |
Description
Wade Mealing
2018-11-06 01:21:12 UTC
Statement: Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1771645] External References: https://access.redhat.com/security/vulnerabilities/ifu-page-mce https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2019:3833 https://access.redhat.com/errata/RHSA-2019:3833 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:3835 https://access.redhat.com/errata/RHSA-2019:3835 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2019:3832 https://access.redhat.com/errata/RHSA-2019:3832 This issue has been addressed in the following products: Red Hat Virtualization 4.2 for Red Hat Enterprise Linux 7.6 EUS Red Hat Virtualization 4 for Red Hat Enterprise Linux 7 Via RHSA-2019:3860 https://access.redhat.com/errata/RHSA-2019:3860 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.6 Extended Update Support Via RHSA-2019:3837 https://access.redhat.com/errata/RHSA-2019:3837 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.5 Extended Update Support Via RHSA-2019:3838 https://access.redhat.com/errata/RHSA-2019:3838 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:3834 https://access.redhat.com/errata/RHSA-2019:3834 This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2019:3836 https://access.redhat.com/errata/RHSA-2019:3836 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.2 Telco Extended Update Support Red Hat Enterprise Linux 7.2 Advanced Update Support Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions Via RHSA-2019:3841 https://access.redhat.com/errata/RHSA-2019:3841 This issue has been addressed in the following products: Red Hat Enterprise MRG 2 Via RHSA-2019:3844 https://access.redhat.com/errata/RHSA-2019:3844 This issue has been addressed in the following products: Red Hat Enterprise Linux 6.6 Advanced Update Support Via RHSA-2019:3842 https://access.redhat.com/errata/RHSA-2019:3842 This issue has been addressed in the following products: Red Hat Enterprise Linux 6.5 Advanced Update Support Via RHSA-2019:3843 https://access.redhat.com/errata/RHSA-2019:3843 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.3 Telco Extended Update Support Red Hat Enterprise Linux 7.3 Advanced Update Support Red Hat Enterprise Linux 7.3 Update Services for SAP Solutions Via RHSA-2019:3840 https://access.redhat.com/errata/RHSA-2019:3840 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.4 Advanced Update Support Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions Red Hat Enterprise Linux 7.4 Telco Extended Update Support Via RHSA-2019:3839 https://access.redhat.com/errata/RHSA-2019:3839 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-12207 Mitigation: For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce . This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.2 Via RHSA-2019:3916 https://access.redhat.com/errata/RHSA-2019:3916 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2019:3936 https://access.redhat.com/errata/RHSA-2019:3936 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.1 Via RHSA-2019:3941 https://access.redhat.com/errata/RHSA-2019:3941 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.6 Extended Update Support Via RHSA-2020:0026 https://access.redhat.com/errata/RHSA-2020:0026 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:0028 https://access.redhat.com/errata/RHSA-2020:0028 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions Via RHSA-2020:0204 https://access.redhat.com/errata/RHSA-2020:0204 |