Bug 2147572 (CVE-2022-4139) - CVE-2022-4139 kernel: i915: Incorrect GPU TLB flush can lead to random memory access [NEEDINFO]
Summary: CVE-2022-4139 kernel: i915: Incorrect GPU TLB flush can lead to random memory...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2022-4139
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: Red Hat2147583 Red Hat2147584 Red Hat2147585 Red Hat2147586 Red Hat2147587 Red Hat2147588 Red Hat2147589 Red Hat2147590 Red Hat2147591 Red Hat2148140 Red Hat2148141 Red Hat2148142 Red Hat2148143 Red Hat2148144 Red Hat2148145 Red Hat2148146 Red Hat2148147 Red Hat2148148 Red Hat2148149 Red Hat2148150 Red Hat2148151 Red Hat2148152 Red Hat2148153 Red Hat2148157 Red Hat2148158 Red Hat2148159 Red Hat2148160 Red Hat2148161 Red Hat2148162 Red Hat2148163 Red Hat2148164 Red Hat2148165 Red Hat2148166 Engineering2148920 2149657
Blocks: Embargoed2147540 Red Hat2148387
TreeView+ depends on / blocked
 
Reported: 2022-11-24 10:26 UTC by Mauro Matteo Cascella
Modified: 2023-05-16 21:45 UTC (History)
45 users (show)

Fixed In Version: kernel 6.1-rc7
Doc Type: If docs needed, set a value
Doc Text:
An incorrect TLB flush issue was found in the Linux kernel’s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.
Clone Of:
Environment:
Last Closed: 2023-05-16 21:45:37 UTC
mcascell: needinfo? (airlied)


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2023:0131 0 None None None 2023-01-12 12:54:58 UTC
Red Hat Product Errata RHBA-2023:0157 0 None None None 2023-01-12 14:26:15 UTC
Red Hat Product Errata RHBA-2023:0176 0 None None None 2023-01-16 11:53:39 UTC
Red Hat Product Errata RHBA-2023:0177 0 None None None 2023-01-16 11:55:56 UTC
Red Hat Product Errata RHBA-2023:0178 0 None None None 2023-01-16 12:14:11 UTC
Red Hat Product Errata RHBA-2023:0188 0 None None None 2023-01-17 11:06:46 UTC
Red Hat Product Errata RHBA-2023:0267 0 None None None 2023-01-19 09:54:02 UTC
Red Hat Product Errata RHSA-2023:0101 0 None None None 2023-01-12 09:19:22 UTC
Red Hat Product Errata RHSA-2023:0114 0 None None None 2023-01-12 09:22:56 UTC
Red Hat Product Errata RHSA-2023:0123 0 None None None 2023-01-12 09:26:13 UTC
Red Hat Product Errata RHSA-2023:0300 0 None None None 2023-01-23 15:17:11 UTC
Red Hat Product Errata RHSA-2023:0334 0 None None None 2023-01-23 15:21:42 UTC
Red Hat Product Errata RHSA-2023:0348 0 None None None 2023-01-23 15:23:21 UTC
Red Hat Product Errata RHSA-2023:0440 0 None None None 2023-01-24 14:40:41 UTC
Red Hat Product Errata RHSA-2023:0441 0 None None None 2023-01-24 14:17:16 UTC
Red Hat Product Errata RHSA-2023:0496 0 None None None 2023-01-30 14:37:16 UTC
Red Hat Product Errata RHSA-2023:0499 0 None None None 2023-01-30 14:31:43 UTC
Red Hat Product Errata RHSA-2023:0512 0 None None None 2023-01-30 14:42:50 UTC
Red Hat Product Errata RHSA-2023:0526 0 None None None 2023-01-30 14:41:20 UTC
Red Hat Product Errata RHSA-2023:0531 0 None None None 2023-01-30 15:27:57 UTC
Red Hat Product Errata RHSA-2023:0536 0 None None None 2023-01-30 15:08:28 UTC
Red Hat Product Errata RHSA-2023:0859 0 None None None 2023-02-21 10:40:33 UTC

Description Mauro Matteo Cascella 2022-11-24 10:26:40 UTC
Incorrect GPU TLB flush code has been discovered in i915 kernel driver. In some cases (Gen12 hardware with specific types of engine) the engine's TLB is not flushed at all. Depending on whether the GPU is running behind an active IOMMU there are two possible scenarios which can happen, due to stale TLB mapping:

1. Without IOMMU - GPU can still access physical memory which could be already assigned by OS to different process.
2. With IOMMU - GPU can access any memory, if the malicious process is able to create/reuse necessary IOMMU mappings.

It is currently not known if specific memory could be targeted, but random memory corruption or data leaks are a known possibility. All Intel integrated and discrete GPUs Gen12 are affected, including Tiger Lake, Rocket Lake, Alder Lake, DG1, Raptor Lake, DG2, Arctic Sound, Meteor Lake.

This vulnerability has similar impact as CVE-2022-0330: https://access.redhat.com/security/cve/CVE-2022-0330.

Reference:
https://www.openwall.com/lists/oss-security/2022/11/30/1

Comment 10 Mauro Matteo Cascella 2022-11-30 14:16:44 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 2149657]

Comment 11 Mauro Matteo Cascella 2022-12-01 13:02:42 UTC
Upstream fix:
https://github.com/torvalds/linux/commit/04aa64375f48a5d430b5550d9271f8428883e550

Comment 12 Dave Airlie 2022-12-02 02:14:02 UTC
For RHEL 7: it doesn't support Gen12 at all. so I'll close all those.

Comment 13 Dave Airlie 2022-12-02 02:29:44 UTC
I've closed all the kernel streams that this doesn't affect. It's RHEL 8.3 and forward, and RHEL 9.0 and forward.

Comment 19 errata-xmlrpc 2023-01-12 09:19:18 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:0101 https://access.redhat.com/errata/RHSA-2023:0101

Comment 20 errata-xmlrpc 2023-01-12 09:22:52 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:0114 https://access.redhat.com/errata/RHSA-2023:0114

Comment 21 errata-xmlrpc 2023-01-12 09:26:08 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:0123 https://access.redhat.com/errata/RHSA-2023:0123

Comment 22 errata-xmlrpc 2023-01-23 15:17:06 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:0300 https://access.redhat.com/errata/RHSA-2023:0300

Comment 23 errata-xmlrpc 2023-01-23 15:21:37 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:0334 https://access.redhat.com/errata/RHSA-2023:0334

Comment 24 errata-xmlrpc 2023-01-23 15:23:17 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:0348 https://access.redhat.com/errata/RHSA-2023:0348

Comment 25 errata-xmlrpc 2023-01-24 14:17:12 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2023:0441 https://access.redhat.com/errata/RHSA-2023:0441

Comment 26 errata-xmlrpc 2023-01-24 14:40:37 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2023:0440 https://access.redhat.com/errata/RHSA-2023:0440

Comment 27 errata-xmlrpc 2023-01-30 14:31:39 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Extended Update Support

Via RHSA-2023:0499 https://access.redhat.com/errata/RHSA-2023:0499

Comment 28 errata-xmlrpc 2023-01-30 14:37:13 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Extended Update Support

Via RHSA-2023:0496 https://access.redhat.com/errata/RHSA-2023:0496

Comment 29 errata-xmlrpc 2023-01-30 14:41:17 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Extended Update Support

Via RHSA-2023:0526 https://access.redhat.com/errata/RHSA-2023:0526

Comment 30 errata-xmlrpc 2023-01-30 14:42:47 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Extended Update Support

Via RHSA-2023:0512 https://access.redhat.com/errata/RHSA-2023:0512

Comment 31 errata-xmlrpc 2023-01-30 15:08:24 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Extended Update Support

Via RHSA-2023:0536 https://access.redhat.com/errata/RHSA-2023:0536

Comment 32 errata-xmlrpc 2023-01-30 15:27:54 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Extended Update Support

Via RHSA-2023:0531 https://access.redhat.com/errata/RHSA-2023:0531

Comment 34 errata-xmlrpc 2023-02-21 10:40:29 UTC
This issue has been addressed in the following products:

  Red Hat Virtualization 4 for Red Hat Enterprise Linux 8

Via RHSA-2023:0859 https://access.redhat.com/errata/RHSA-2023:0859

Comment 38 Product Security DevOps Team 2023-05-16 21:45:33 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-4139


Note You need to log in before you can comment on or make changes to this bug.