Bug 2090240 (CVE-2022-21125) - CVE-2022-21125 hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS)
Summary: CVE-2022-21125 hw: cpu: incomplete clean-up of microarchitectural fill buffer...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2022-21125
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2090245 2090246 2090247 2090248 2090249 2090251 2090252 2090253 2090254 2090256 2090257 2110380 2110381 2110382 2110383 2110384 2110385 2110386 2110387 2110388 2110389 2110390 2110391 2110392 2110393 2110394 2110395 2110396 2110397 2110398 2110400 2110401 2110402 2110403
Blocks: 2004886
TreeView+ depends on / blocked
 
Reported: 2022-05-25 12:35 UTC by Petr Matousek
Modified: 2023-09-25 12:34 UTC (History)
54 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in hw. Incomplete cleanup of microarchitectural fill buffers on some Intel® Processors may allow an authenticated user to enable information disclosure via local access.
Clone Of:
Environment:
Last Closed: 2022-12-14 12:48:38 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2022:7890 0 None None None 2022-11-09 15:34:42 UTC
Red Hat Product Errata RHBA-2022:9021 0 None None None 2022-12-14 12:02:56 UTC
Red Hat Product Errata RHSA-2022:5937 0 None None None 2022-08-09 11:50:05 UTC
Red Hat Product Errata RHSA-2022:5939 0 None None None 2022-08-09 11:52:55 UTC
Red Hat Product Errata RHSA-2022:6437 0 None None None 2022-09-13 09:40:29 UTC
Red Hat Product Errata RHSA-2022:6460 0 None None None 2022-09-13 09:45:50 UTC
Red Hat Product Errata RHSA-2022:6872 0 None None None 2022-10-11 12:31:57 UTC
Red Hat Product Errata RHSA-2022:6983 0 None None None 2022-10-18 08:15:17 UTC
Red Hat Product Errata RHSA-2022:6991 0 None None None 2022-10-18 08:07:47 UTC
Red Hat Product Errata RHSA-2022:7279 0 None None None 2022-11-01 14:17:18 UTC
Red Hat Product Errata RHSA-2022:7280 0 None None None 2022-11-01 14:17:56 UTC
Red Hat Product Errata RHSA-2022:7933 0 None None None 2022-11-15 09:45:25 UTC
Red Hat Product Errata RHSA-2022:8267 0 None None None 2022-11-15 10:48:30 UTC
Red Hat Product Errata RHSA-2022:8973 0 None None None 2022-12-13 16:05:40 UTC
Red Hat Product Errata RHSA-2022:8974 0 None None None 2022-12-13 16:06:23 UTC

Description Petr Matousek 2022-05-25 12:35:04 UTC
Some processors do not properly clean up and remove temporary or supporting resources after they have been used.

References:

https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html

Comment 8 errata-xmlrpc 2022-08-09 11:50:01 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2022:5937 https://access.redhat.com/errata/RHSA-2022:5937

Comment 9 errata-xmlrpc 2022-08-09 11:52:52 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2022:5939 https://access.redhat.com/errata/RHSA-2022:5939

Comment 10 errata-xmlrpc 2022-09-13 09:40:24 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:6437 https://access.redhat.com/errata/RHSA-2022:6437

Comment 11 errata-xmlrpc 2022-09-13 09:45:45 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:6460 https://access.redhat.com/errata/RHSA-2022:6460

Comment 12 errata-xmlrpc 2022-10-11 12:31:52 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions

Via RHSA-2022:6872 https://access.redhat.com/errata/RHSA-2022:6872

Comment 13 errata-xmlrpc 2022-10-18 08:07:41 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Extended Update Support

Via RHSA-2022:6991 https://access.redhat.com/errata/RHSA-2022:6991

Comment 14 errata-xmlrpc 2022-10-18 08:15:12 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Extended Update Support

Via RHSA-2022:6983 https://access.redhat.com/errata/RHSA-2022:6983

Comment 15 errata-xmlrpc 2022-11-01 14:17:12 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.2 Telecommunications Update Service

Via RHSA-2022:7279 https://access.redhat.com/errata/RHSA-2022:7279

Comment 16 errata-xmlrpc 2022-11-01 14:17:51 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Telecommunications Update Service

Via RHSA-2022:7280 https://access.redhat.com/errata/RHSA-2022:7280

Comment 17 errata-xmlrpc 2022-11-15 09:45:20 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2022:7933 https://access.redhat.com/errata/RHSA-2022:7933

Comment 18 errata-xmlrpc 2022-11-15 10:48:24 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2022:8267 https://access.redhat.com/errata/RHSA-2022:8267

Comment 19 errata-xmlrpc 2022-12-13 16:05:37 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Extended Update Support

Via RHSA-2022:8973 https://access.redhat.com/errata/RHSA-2022:8973

Comment 20 errata-xmlrpc 2022-12-13 16:06:17 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Extended Update Support

Via RHSA-2022:8974 https://access.redhat.com/errata/RHSA-2022:8974

Comment 21 Product Security DevOps Team 2022-12-14 12:48:33 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-21125


Note You need to log in before you can comment on or make changes to this bug.