Bug 1695049 (CVE-2019-10124)

Summary: CVE-2019-10124 kernel: hwpoison implementation in mm/memory-failure.c leads to denial of service
Product: [Other] Security Response Reporter: msiddiqu
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: acaringi, airlied, bhu, blc, brdeoliv, bskeggs, dhoward, dvlasenk, esammons, fhrbata, hdegoede, hkrzesin, iboverma, ichavero, itamar, jarodwilson, jeremy, jforbes, jglisse, jkacur, john.j5live, jonathan, josef, jross, jstancek, jwboyer, kernel-maint, kernel-mgr, labbott, lgoncalv, linville, matt, mchehab, mcressma, mjg59, mlangsdo, nmurray, plougher, rt-maint, rvrbovsk, steved, vdronov, williams
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A bug was discovered in the hwpoison implementation in mm/memory-failure.c in the Linux kernel. When soft_offline_in_use_page() is run for a thp tail page after pmd is split, a privileged attacker can cause a denial of service (DoS). Privileged access is required for an attacker to trigger this bug, thus, we believe this bug is not a security flaw.
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-04-11 12:13:03 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1695050    
Bug Blocks: 1695052    

Description msiddiqu 2019-04-02 11:45:55 UTC
A bug was discovered in the hwpoison implementation in mm/memory-failure.c in the Linux kernel. When soft_offline_in_use_page() is run for a thp tail page after pmd is split, a privileged attacker can cause a denial of service (DoS). A privileges access is required for an attacker to trigger this bug, henceforth, we believe this bug is not a security flaw.

Upstream patches:

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=46612b751c4941c5c0472ddf04027e877ae5990f

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c3901e722b2975666f42748340df798114742d6d

Comment 1 msiddiqu 2019-04-02 11:46:10 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1695050]

Comment 2 Justin M. Forbes 2019-04-03 12:09:02 UTC
This was fixed for Fedora with the 5.0.4 stable kernel updates

Comment 3 Vladis Dronov 2019-04-11 12:09:27 UTC
Note: A privileges access (a real "root") is required for an attacker to trigger this bug. Henceforth, we believe this bug is not a security flaw.

For example, soft_offline_in_use_page() can be called by soft_offline_page which in turn is called from madvise_inject_error() which allows to execute it only by a privileged user (a real "root"):

[mm/madvise.c]
static int madvise_inject_error(int behavior, unsigned long start, unsigned long end)
{ ...
    if (!capable(CAP_SYS_ADMIN))
        return -EPERM;