Microprocessors use ‘load ports’ to perform load operations from memory or IO. During a load operation, the load port receives data from the memory or IO subsystem and then provides the data to the CPU registers and operations in the CPU’s pipelines. In some implementations, the writeback data bus within each load port can retain data values from older load operations until newer load operations overwrite that data MLPDS can reveal stale load port data to malicious actors when: - A faulting/assisting SSE/AVX/AVX-512 loads that are more than 64 bits in size - A faulting/assisting load which spans a 64-byte boundary. In the above cases, the load operation speculatively provides stale data values from the internal data structures to dependent operations. Speculatively forwarding this data does not end up modifying program execution, but this can be used as a widget to speculatively infer the contents of a victim processes data value through timing access to the load port. Additional information: https://access.redhat.com/security/vulnerabilities/mds Upstream fixes: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fa4bff165070dc40a3de35b78e4f8da8e8d85ec5 Intel Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html
*** Bug 1646775 has been marked as a duplicate of this bug. ***
*** Bug 1646778 has been marked as a duplicate of this bug. ***
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1709978] Created libvirt tracking bugs for this issue: Affects: fedora-all [bug 1709979]
External References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html https://access.redhat.com/security/vulnerabilities/mds
Created qemu tracking bugs for this issue: Affects: fedora-all [bug 1710004]
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2019:1175 https://access.redhat.com/errata/RHSA-2019:1175
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2019:1167 https://access.redhat.com/errata/RHSA-2019:1167
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2019:1174 https://access.redhat.com/errata/RHSA-2019:1174
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2019:1169 https://access.redhat.com/errata/RHSA-2019:1169
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2019:1180 https://access.redhat.com/errata/RHSA-2019:1180
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2019:1181 https://access.redhat.com/errata/RHSA-2019:1181
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:1177 https://access.redhat.com/errata/RHSA-2019:1177
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:1178 https://access.redhat.com/errata/RHSA-2019:1178
This issue has been addressed in the following products: Red Hat Virtualization 4 for Red Hat Enterprise Linux 7 Via RHSA-2019:1179 https://access.redhat.com/errata/RHSA-2019:1179
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:1168 https://access.redhat.com/errata/RHSA-2019:1168
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:1176 https://access.redhat.com/errata/RHSA-2019:1176
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.4 Extended Update Support Via RHSA-2019:1170 https://access.redhat.com/errata/RHSA-2019:1170
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.4 Extended Update Support Via RHSA-2019:1184 https://access.redhat.com/errata/RHSA-2019:1184
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.4 Extended Update Support Via RHSA-2019:1185 https://access.redhat.com/errata/RHSA-2019:1185
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.5 Extended Update Support Via RHSA-2019:1182 https://access.redhat.com/errata/RHSA-2019:1182
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.5 Extended Update Support Via RHSA-2019:1155 https://access.redhat.com/errata/RHSA-2019:1155
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.5 Extended Update Support Via RHSA-2019:1183 https://access.redhat.com/errata/RHSA-2019:1183
This issue has been addressed in the following products: Red Hat Enterprise Linux 6.6 Advanced Update Support Via RHSA-2019:1193 https://access.redhat.com/errata/RHSA-2019:1193
This issue has been addressed in the following products: Red Hat Enterprise Linux 6.5 Advanced Update Support Via RHSA-2019:1196 https://access.redhat.com/errata/RHSA-2019:1196
This issue has been addressed in the following products: Red Hat Enterprise Linux 6.6 Advanced Update Support Via RHSA-2019:1195 https://access.redhat.com/errata/RHSA-2019:1195
This issue has been addressed in the following products: Red Hat Enterprise Linux 6.5 Advanced Update Support Via RHSA-2019:1198 https://access.redhat.com/errata/RHSA-2019:1198
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.2 Advanced Update Support Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions Red Hat Enterprise Linux 7.2 Telco Extended Update Support Via RHSA-2019:1172 https://access.redhat.com/errata/RHSA-2019:1172
This issue has been addressed in the following products: Red Hat Enterprise MRG 2 Via RHSA-2019:1190 https://access.redhat.com/errata/RHSA-2019:1190
This issue has been addressed in the following products: Red Hat Enterprise Linux 6.6 Advanced Update Support Via RHSA-2019:1194 https://access.redhat.com/errata/RHSA-2019:1194
This issue has been addressed in the following products: Red Hat OpenStack Platform 9.0 (Mitaka) Via RHSA-2019:1199 https://access.redhat.com/errata/RHSA-2019:1199
This issue has been addressed in the following products: Red Hat OpenStack Platform 10.0 (Newton) Via RHSA-2019:1200 https://access.redhat.com/errata/RHSA-2019:1200
This issue has been addressed in the following products: Red Hat OpenStack Platform 14.0 (Rocky) Via RHSA-2019:1202 https://access.redhat.com/errata/RHSA-2019:1202
This issue has been addressed in the following products: Red Hat OpenStack Platform 13.0 (Queens) Via RHSA-2019:1201 https://access.redhat.com/errata/RHSA-2019:1201
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.3 Advanced Update Support Red Hat Enterprise Linux 7.3 Update Services for SAP Solutions Red Hat Enterprise Linux 7.3 Telco Extended Update Support Via RHSA-2019:1171 https://access.redhat.com/errata/RHSA-2019:1171
This issue has been addressed in the following products: Red Hat Enterprise Linux 6.5 Advanced Update Support Via RHSA-2019:1197 https://access.redhat.com/errata/RHSA-2019:1197
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.3 Telco Extended Update Support Red Hat Enterprise Linux 7.3 Advanced Update Support Red Hat Enterprise Linux 7.3 Update Services for SAP Solutions Via RHSA-2019:1187 https://access.redhat.com/errata/RHSA-2019:1187
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.2 Telco Extended Update Support Red Hat Enterprise Linux 7.2 Advanced Update Support Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions Via RHSA-2019:1186 https://access.redhat.com/errata/RHSA-2019:1186
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.3 Advanced Update Support Red Hat Enterprise Linux 7.3 Update Services for SAP Solutions Red Hat Enterprise Linux 7.3 Telco Extended Update Support Via RHSA-2019:1189 https://access.redhat.com/errata/RHSA-2019:1189
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.2 Advanced Update Support Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions Red Hat Enterprise Linux 7.2 Telco Extended Update Support Via RHSA-2019:1188 https://access.redhat.com/errata/RHSA-2019:1188
This issue has been addressed in the following products: Red Hat Virtualization 4 for Red Hat Enterprise Linux 7 Via RHSA-2019:1203 https://access.redhat.com/errata/RHSA-2019:1203
This issue has been addressed in the following products: Red Hat Virtualization 4.2 for Red Hat Enterprise Linux 7.6 EUS Via RHSA-2019:1204 https://access.redhat.com/errata/RHSA-2019:1204
This issue has been addressed in the following products: Red Hat Virtualization Engine 4.3 Via RHSA-2019:1205 https://access.redhat.com/errata/RHSA-2019:1205
This issue has been addressed in the following products: Red Hat Virtualization Engine 4.2 Via RHSA-2019:1206 https://access.redhat.com/errata/RHSA-2019:1206
This issue has been addressed in the following products: Red Hat Virtualization 4 for Red Hat Enterprise Linux 7 Via RHSA-2019:1207 https://access.redhat.com/errata/RHSA-2019:1207
This issue has been addressed in the following products: Red Hat Virtualization 4.2 for Red Hat Enterprise Linux 7.6 EUS Via RHSA-2019:1209 https://access.redhat.com/errata/RHSA-2019:1209
This issue has been addressed in the following products: Red Hat Virtualization 4 for Red Hat Enterprise Linux 7 Via RHSA-2019:1208 https://access.redhat.com/errata/RHSA-2019:1208
This issue has been addressed in the following products: Advanced Virtualization for RHEL 8.0.0.Z Via RHSA-2019:1455 https://access.redhat.com/errata/RHSA-2019:1455
This issue has been addressed in the following products: Red Hat Virtualization 4 for Red Hat Enterprise Linux 7 Red Hat Virtualization Engine 4.3 Via RHSA-2019:2553 https://access.redhat.com/errata/RHSA-2019:2553
Statement: Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the 'Vulnerability Response' URL.
OpenShift Container Platform 4 does not ship its own kernel package, instead using versions shipped in RHEL. Removing from flaw bug affects.