Bug 2090243 (CVE-2022-21127)

Summary: CVE-2022-21127 hw: cpu: Incomplete cleanup in specific special register read operations (aka SRBDS update)
Product: [Other] Security Response Reporter: Petr Matousek <pmatouse>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: esyr, jpoimboe, security-response-team, skozina
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in hw. Incomplete cleanup in specific special register read operations for some IntelĀ® Processors may allow an authenticated user to enable information disclosure via local access.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 2090258, 2090260, 2090261, 2090259    
Bug Blocks: 2004886    

Description Petr Matousek 2022-05-25 12:42:59 UTC
Some processors do not properly clean up and remove temporary or supporting resources after they have been used.

References:

https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html