Bug 1897402 (CVE-2020-12912)
Summary: | CVE-2020-12912 kernel: unprivileged access to RAPL allows for side channel attacks | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Wade Mealing <wmealing> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | acaringi, adscvr, airlied, bhu, blc, bmasney, brdeoliv, bskeggs, dhoward, dvlasenk, esammons, fhrbata, hdegoede, hkrzesin, iboverma, itamar, jarodwilson, jeremy, jforbes, jglisse, jlelli, jonathan, josef, jross, jshortt, jstancek, jwboyer, kcarcia, kernel-maint, kernel-mgr, lgoncalv, linville, masami256, mchehab, mcressma, mjg59, mlangsdo, nmurray, ptalbert, qzhao, rt-maint, rvrbovsk, steved, walters, williams |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A flaw was found in the Linux kernel’s implementation of RAPL for AMD CPUs. This flaw allows a user with a local account to use the RAPL interface to gain information on the CPU execution state, resulting in an information leak of sensitive data across security boundaries. The highest threat from this vulnerability is to confidentiality.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2020-11-13 11:28:31 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1897506 | ||
Bug Blocks: | 1897295 |
Description
Wade Mealing
2020-11-13 01:48:35 UTC
External References: https://support.lenovo.com/lu/uk/product_security/LEN-50481 https://www.amd.com/en/corporate/product-security https://www.cybersecurity-help.cz/vdb/SB2020111118 Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1897506] This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-12912 This was fixed for Fedora with the 5.9.9 stable kernel updates. |