Bug 1719410 (CVE-2019-0174, RamBleed) - CVE-2019-0174 hw: dram: reading bits in memory without accessing them
Summary: CVE-2019-0174 hw: dram: reading bits in memory without accessing them
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2019-0174, RamBleed
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 1674338
TreeView+ depends on / blocked
 
Reported: 2019-06-11 18:18 UTC by Petr Matousek
Modified: 2021-02-16 21:50 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2019-07-12 13:07:33 UTC
Embargoed:


Attachments (Terms of Use)

Description Petr Matousek 2019-06-11 18:18:23 UTC
A vulnerability named RAMBleed was discovered in contemporary industry wide DRAM memory implementations which potentially allows an unprivileged attacker to read out certain memory belonging to other processes by leveraging the Rowhammer bit-flipping effect. The data read may otherwise be inaccessible, and could include potentially secret information. RAMBleed is a side channel read vulnerability as the Rowhammer-induced bit-flips allow attackers to deduce values of bits in the memory belonging to other processes. Surrounding victim data pages with carefully constructed attacker pages, on which hammering is performed can allow data dependent bit flips to be induced in one of the attacker controlled pages, and allow data to be reconstructed.

Comment 1 Petr Matousek 2019-06-11 18:25:07 UTC
Statement:

Red Hat Product Security is aware of this issue. For additional information, please refer to the Red Hat Knowledgebase article:  https://access.redhat.com/articles/1377393

Comment 2 Product Security DevOps Team 2019-07-12 13:07:33 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2019-0174


Note You need to log in before you can comment on or make changes to this bug.