Bug 1695049 (CVE-2019-10124) - CVE-2019-10124 kernel: hwpoison implementation in mm/memory-failure.c leads to denial of service
Summary: CVE-2019-10124 kernel: hwpoison implementation in mm/memory-failure.c leads t...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2019-10124
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1695050
Blocks: 1695052
TreeView+ depends on / blocked
 
Reported: 2019-04-02 11:45 UTC by msiddiqu
Modified: 2019-09-29 15:10 UTC (History)
43 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A bug was discovered in the hwpoison implementation in mm/memory-failure.c in the Linux kernel. When soft_offline_in_use_page() is run for a thp tail page after pmd is split, a privileged attacker can cause a denial of service (DoS). Privileged access is required for an attacker to trigger this bug, thus, we believe this bug is not a security flaw.
Clone Of:
Environment:
Last Closed: 2019-04-11 12:13:03 UTC
Embargoed:


Attachments (Terms of Use)

Description msiddiqu 2019-04-02 11:45:55 UTC
A bug was discovered in the hwpoison implementation in mm/memory-failure.c in the Linux kernel. When soft_offline_in_use_page() is run for a thp tail page after pmd is split, a privileged attacker can cause a denial of service (DoS). A privileges access is required for an attacker to trigger this bug, henceforth, we believe this bug is not a security flaw.

Upstream patches:

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=46612b751c4941c5c0472ddf04027e877ae5990f

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c3901e722b2975666f42748340df798114742d6d

Comment 1 msiddiqu 2019-04-02 11:46:10 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1695050]

Comment 2 Justin M. Forbes 2019-04-03 12:09:02 UTC
This was fixed for Fedora with the 5.0.4 stable kernel updates

Comment 3 Vladis Dronov 2019-04-11 12:09:27 UTC
Note: A privileges access (a real "root") is required for an attacker to trigger this bug. Henceforth, we believe this bug is not a security flaw.

For example, soft_offline_in_use_page() can be called by soft_offline_page which in turn is called from madvise_inject_error() which allows to execute it only by a privileged user (a real "root"):

[mm/madvise.c]
static int madvise_inject_error(int behavior, unsigned long start, unsigned long end)
{ ...
    if (!capable(CAP_SYS_ADMIN))
        return -EPERM;


Note You need to log in before you can comment on or make changes to this bug.