Note: This is a public test instance of Red Hat Bugzilla. The data contained within is a snapshot of the live data so any changes you make will not be reflected in the production Bugzilla. Email is disabled so feel free to test any aspect of the site that you want. File any problems you find or give feedback at bugzilla.redhat.com.
Bug 2147572 (CVE-2022-4139)
Summary: | CVE-2022-4139 kernel: i915: Incorrect GPU TLB flush can lead to random memory access | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Mauro Matteo Cascella <mcascell> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | acaringi, airlied, arachman, bhu, chwhite, crwood, ddepaula, debarbos, dvlasenk, ezulian, hkrzesin, jarod, jburrell, jfaracco, jferlan, jforbes, jlelli, joe.lawrence, jpoimboe, jshortt, jstancek, jwyatt, kcarcia, kernel-mgr, kpatch-maint, lgoncalv, lleshchi, lveyde, lzampier, michal.skrivanek, mperina, nmurray, ptalbert, qzhao, rhandlin, rvrbovsk, sbalasub, sbonazzo, scweaver, security-response-team, tyberry, vkumar, walters, williams, ycote |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | kernel 6.1-rc7 | Doc Type: | If docs needed, set a value |
Doc Text: |
An incorrect TLB flush issue was found in the Linux kernel’s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2023-05-16 21:45:37 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2147583, 2147584, 2147585, 2147586, 2147587, 2147588, 2147589, 2147590, 2147591, 2148140, 2148141, 2148142, 2148143, 2148144, 2148145, 2148146, 2148147, 2148148, 2148149, 2148150, 2148151, 2148152, 2148153, 2148157, 2148158, 2148159, 2148160, 2148161, 2148162, 2148163, 2148164, 2148165, 2148166, 2148920, 2149657 | ||
Bug Blocks: | 2148387 |
Description
Mauro Matteo Cascella
2022-11-24 10:26:40 UTC
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2149657] For RHEL 7: it doesn't support Gen12 at all. so I'll close all those. I've closed all the kernel streams that this doesn't affect. It's RHEL 8.3 and forward, and RHEL 9.0 and forward. This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:0101 https://access.redhat.com/errata/RHSA-2023:0101 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:0114 https://access.redhat.com/errata/RHSA-2023:0114 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:0123 https://access.redhat.com/errata/RHSA-2023:0123 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:0300 https://access.redhat.com/errata/RHSA-2023:0300 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:0334 https://access.redhat.com/errata/RHSA-2023:0334 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:0348 https://access.redhat.com/errata/RHSA-2023:0348 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2023:0441 https://access.redhat.com/errata/RHSA-2023:0441 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2023:0440 https://access.redhat.com/errata/RHSA-2023:0440 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2023:0499 https://access.redhat.com/errata/RHSA-2023:0499 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2023:0496 https://access.redhat.com/errata/RHSA-2023:0496 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2023:0526 https://access.redhat.com/errata/RHSA-2023:0526 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2023:0512 https://access.redhat.com/errata/RHSA-2023:0512 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2023:0536 https://access.redhat.com/errata/RHSA-2023:0536 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2023:0531 https://access.redhat.com/errata/RHSA-2023:0531 This issue has been addressed in the following products: Red Hat Virtualization 4 for Red Hat Enterprise Linux 8 Via RHSA-2023:0859 https://access.redhat.com/errata/RHSA-2023:0859 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-4139 The needinfo request[s] on this closed bug have been removed as they have been unresolved for 120 days |