CVE-2018-12130

Related Vulnerabilities: CVE-2018-12130  

Impact: Important Public Date: 2019-05-14 CWE: CWE-203->CWE-385 Bugzilla: 1646784: CVE-2018-12130 hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) A flaw was found in the implementation of the "fill buffer", a mechanism used by modern CPUs when a cache-miss is made on L1 CPU cache. If an attacker can generate a load operation that would create a page fault, the execution will continue speculatively with incorrect data from the fill buffer while the data is fetched from higher level caches. This response time can be measured to infer data in the fill buffer.

A flaw was found in the implementation of the "fill buffer", a mechanism used by modern CPUs when a cache-miss is made on L1 CPU cache. If an attacker can generate a load operation that would create a page fault, the execution will continue speculatively with incorrect data from the fill buffer while the data is fetched from higher level caches. This response time can be measured to infer data in the fill buffer.

Find out more about CVE-2018-12130 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/mds

CVSS v3 metrics

NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.

CVSS3 Base Score 6.2
CVSS3 Base Metrics CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector Local
Attack Complexity Low
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality High
Integrity Impact None
Availability Impact None

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 8 (kernel) RHSA-2019:1167 2019-05-14
Red Hat Enterprise Linux 8 (kernel-rt) RHSA-2019:1174 2019-05-14
Red Hat Enterprise Linux Extended Update Support 7.5 (libvirt) RHSA-2019:1182 2019-05-14
Red Hat Enterprise Linux 8 (kernel) RHSA-2019:1167 2019-05-14
Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts (qemu-kvm-rhev) RHSA-2019:1179 2019-05-14
Red Hat Enterprise Linux 7 (qemu-kvm) RHSA-2019:1178 2019-05-14
Red Hat Enterprise Linux Extended Update Support 7.4 (kernel) RHSA-2019:1170 2019-05-14
Red Hat Enterprise Linux 7 (libvirt) RHSA-2019:1177 2019-05-14
Red Hat Enterprise Linux 8 (kernel-rt) RHSA-2019:1174 2019-05-14
Red Hat Enterprise Linux Extended Update Support 7.4 (libvirt) RHSA-2019:1184 2019-05-14
Red Hat Enterprise Linux Extended Update Support 7.4 (qemu-kvm) RHSA-2019:1185 2019-05-14
Red Hat Enterprise Linux for Real Time for NFV (v. 7) (kernel-rt) RHSA-2019:1176 2019-05-14
Red Hat Enterprise Linux 7 (kernel) RHSA-2019:1168 2019-05-14
Red Hat Enterprise Linux 6 (libvirt) RHSA-2019:1180 2019-05-14
Red Hat Enterprise Linux 6 (qemu-kvm) RHSA-2019:1181 2019-05-14
Red Hat Enterprise Linux Extended Update Support 7.5 (kernel) RHSA-2019:1155 2019-05-14
Red Hat Enterprise Linux 8 (virt:rhel) RHSA-2019:1175 2019-05-14
Red Hat Enterprise Linux Extended Update Support 7.5 (qemu-kvm) RHSA-2019:1183 2019-05-14
Red Hat Enterprise Linux 6 (kernel) RHSA-2019:1169 2019-05-14

Affected Packages State

Platform Package State
Red Hat Virtualization 4 vdsm Affected
Red Hat Virtualization 4 ovirt-guest-agent Affected
Red Hat Virtualization 4 rhvm-appliance Affected
Red Hat Virtualization 4 rhvm-setup-plugins Affected
Red Hat Virtualization 4 redhat-virtualization-host Affected
Red Hat OpenStack Platform 9.0 qemu-kvm-rhev Affected
Red Hat OpenStack Platform 14.0 (Rocky) qemu-kvm-rhev Affected
Red Hat OpenStack Platform 13.0 (Queens) qemu-kvm-rhev Affected
Red Hat OpenStack Platform 10 qemu-kvm-rhev Affected
Red Hat Enterprise MRG 2 kernel-rt Affected
Red Hat Enterprise Linux 8 Advanced Virtualization virt:8.0.0/libvirt Affected
Red Hat Enterprise Linux 8 Advanced Virtualization virt:8.0.0/qemu-kvm Affected
Red Hat Enterprise Linux 7 kernel-alt Not affected
Red Hat Enterprise Linux 5 kernel Will not fix

Acknowledgements

Red Hat thanks Intel and industry partners for reporting this issue and collaborating on the mitigations for the same. Additionally Red Hat thanks the original reporters, This issue was found internally by Intel employees. Intel thanks Ke Sun, Henrique Kawakami, Kekai Hu and Rodrigo Branco. It was independently found by Giorgi Maisuradze with Microsoft Research, Volodymyr Pikhur, Dan Horea Lutas - BitDefender, Stephan van Schaik, Alyssa Milburn, Sebastian Ãsterlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida - VUSec group at VU Amsterdam, Moritz Lipp, Michael Schwarz, and Daniel Gruss - Graz University of Technology.