Intel Microarchitectural Data Sampling (MDS) Vulnerabilities & Its Mitigation in Oracle Cloud

Intel Microarchitectural Data Sampling (MDS) Vulnerabilities
Oracle

Share Post Now :

HOW TO GET HIGH PAYING JOBS IN AWS CLOUD

Even as a beginner with NO Experience Coding Language

Explore Free course Now

Table of Contents

Loading

If you are running your workload Oracle Cloud (Compute, Databases), read this complete blog and apply the patches as recommended.

Recently Intel has identified a Vulnerability in their processors which they named as Microarchitectural Data Sampling (MDS) Vulnerability and due to which Intel CPUs may allow information disclosure and one can easily enter your system by using some malicious codes.

This post covers things you must know about Microarchitectural Data Sampling (MDS) Vulnerability & what Oracle Recommends to mitigate this.

What is Microarchitectural Data Sampling (MDS) Vulnerability?

It is referred to as Microarchitectural Data Sampling issues (MDS issues) because they refer to issues related to microarchitectural structures of the Intel processors other than the level 1 data cache and one can easily run some malicious code against these and can enter your system and Intel has rated this Vulnerability as severity medium.

These vulnerabilities have received the following CVE identifiers, where CVE stands for The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information security vulnerabilities and exposures

  • CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
  • CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
  • CVE-2018-12127: Microarchitectural Load Port Data Sampling (MLPDS)
  • CVE-2018-12130: Microarchitectural Fill Buffer Data Sampling (MFBDS)

Where vulnerability CVE-2019-11091 has received a CVSS Base Score of 3.8, the other vulnerabilities have all been rated with a CVSS Base Score of 6.5.  Where CVSS stands for Common Vulnerability Scoring System

Oracle Recommendation to Intel Microarchitectural Data Sampling (MDS) Vulnerabilities

Oracle Hardware

  • Oracle suggests the administrators of x86-based Systems to carefully analyze the impact of MDS on their system, and accordingly implement all the security mitigations such as applying OS patches released for these vulnerabilities.
  • If you are using Oracle Engineered System such as Exadata Machine, Database Appliance, SuperCluster, etc Oracle will give you the specific guidance.

Oracle Operating Systems (Linux and Solaris) and Virtualization

  • If you are using  Oracle Linux 7, Oracle Linux 6, &  Oracle VM Server for X86 Products you should immediately apply the OS patches released by Oracle for this Vulnerabilities, in addition to that you should also run the current version of the Intel microcode to mitigate these issues (#  yum update microcode_ctl ).
  • The required versions of microcode_ctl rpms are Oracle Linux 7: microcode_ctl 2.1-47.0.4 & Oracle Linux 6: microcode_ctl 1.17-1002
  • For Oracle Linux customer you can use Oracle Ksplice tool to patch the OS with zero downtime. To know more check here
  • If you are using Oracle Solaris on x86 then it is affected by these vulnerabilities. For more information check  Doc ID 2540621.1 
  • If you are running your workload on Oracle Solaris on  SPARC, then no action required from your end, as it is not affected by this Vulnerabilities.

Oracle Cloud

  • If you are using Oracle Autonomous Database (ATP & ADW) then no action required for this Vulnerabilities. To know more about Autonomous Database check here
  • If you are using Bare Metal Instances and using your own virtualization stack on top of it then you should review the Intel recommendations about these MDS vulnerabilities and make the recommended changes to their configurations.
  • If you are using VM Instances, then you should patch OS to the latest security patch released by Oracle. To know how to patch please check here
  • For Zero Downtime Patching in Oracle Cloud, you can use Oracle Ksplice only available for Oracle Linux Images, to know how to configure check  here
  • Note: If you are using third party OS, then you should reach out to them for these vulnerabilities patches.
  • If you are running your DB System on Virtual Machine or Bare Metal, you should apply the latest OS Patches, to know how to apply  the OS patch to DB System check here
  • For Exadata DB systems, apply the OS patches following the instructions in Updating an Exadata DB System.
  • If you are using Oracle Cloud Infrastructure Classic and Oracle Platform Service on Oracle Cloud Infrastructure Classic then Oracle will be performing mandatory maintenance for Infrastructure and Platform Services on Oracle Cloud Infrastructure Classic, so no action required from customer ends.

Steps To Install OS Security Patches For MDS Vulnerabilities in Bare Metal & VM Instance with Downtime

Step1: Install the latest microcode released by Intel

# sudo yum update microcode_ctl

The required versions of microcode_ctl rpms are:

  • Oracle Linux 7: microcode_ctl 2.1-47.0.4
  • Oracle Linux 6: microcode_ctl 1.17-1002

Step2: Install the latest security patches  run the following command:

Note: yum-plugin-security package allows you to use yum to obtain a list of all errata that are available for your system, including security updates.

# sudo yum  install yum-plugin-security

Step3: Use the –cve option to display the errata that correspond to a specified CVE, and to install those required packages, by running the following commands:

# sudo yum updateinfo list –cve CVE-####-#####

#sudo yum update –cve CVE-####-####

As Intel has identified 4 different Vulnerabilities so the command should be  like mentioned below:

To list all rpms for each  Vulnerabilities

sudo yum updateinfo list –cve CVE-2019-11091
sudo yum updateinfo list –cve CVE-2018-12126
sudo yum updateinfo list –cve CVE-2018-12127
sudo yum updateinfo list –cve CVE-2018-12130

To update rpms for each  Vulnerabilities

sudo yum update –cve CVE-2019-11091
sudo yum update –cve CVE-2018-12126
sudo yum update –cve CVE-2018-12127
sudo yum update –cve CVE-2018-12130

A system reboot will be required once the package is applied.

To know how to apply OS Patches in Oracle Linux Images using ksplice without downtime, check here.

Step4: After the system reboots, ensure that the following file is populated:

cat /sys/devices/system/cpu/vulnerabilities/mds

Hope you find this blog useful and make sure you update and apply all the security patches as recommended in order to mitigate this Microarchitectural Data Sampling (MDS) Vulnerabilities and comment in the blog & let us if you have any query regarding this Vulnerabilities.

References

Related/Further Readings

Begin Your Cloud Journey

Begin your journey towards becoming an Oracle Cloud Expert and earn a lot more in 2024 by joining our FREE CLASSYou will also know more about the Roles and ResponsibilitiesJob opportunities for OCI Architects, Admins in the market, and what to study Including Hands-On labs you must perform to get the Higher Paying jobs.

Click on the below image to Register for Our FREE Class on MASTERING ORACLE CLOUD FOR DBAs, APPs DBAs, ARCHITECTS & SYS ADMINS

Master Oracle Cloud FREE Class

Picture of mike

mike

I started my IT career in 2000 as an Oracle DBA/Apps DBA. The first few years were tough (<$100/month), with very little growth. In 2004, I moved to the UK. After working really hard, I landed a job that paid me £2700 per month. In February 2005, I saw a job that was £450 per day, which was nearly 4 times of my then salary.