First published: Wed Apr 01 2020(Updated: )
A flaw was found in the way the KVM hypervisor on the Power8 processor stores the r1 register state in the 'HSTATE_HOST_R1' field on the Linux kernel stack. This flaw occurs while handling hypercalls in Transactional Memory (TM) suspend mode in the kvmppc_save_tm and kvmppc_restore_tm routines, leading to host stack corruption. R1 register holds a stack frame address and its corruption leads the kernel into panic state. A guest user can use this flaw to crash the host kernel, resulting in a denial of service.
Credit: security@ubuntu.com security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-alt | <0:4.14.0-115.26.1.el7a | 0:4.14.0-115.26.1.el7a |
Linux Linux kernel | ||
Ibm Power8 | ||
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
openSUSE Leap | =15.1 | |
redhat/Linux | <4.18 | 4.18 |
All of | ||
Linux Linux kernel | ||
Ibm Power8 | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Apply the following three Linux kernel commits, though possibly only the first commit is strictly necessary: 6f597c6b63b6 ("KVM: PPC: Book3S PR: Add guest MSR parameter for kvmppc_save_tm()/kvmppc_restore_tm()") 7b0e827c6970 ("KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm") 009c872a8bc4 ("KVM: PPC: Book3S PR: Move kvmppc_save_tm/kvmppc_restore_tm to separate file")
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-8834 is a vulnerability in the Linux kernel on Power8 processors that allows an attacker with code execution in a guest VM to cause stack corruption in the host kernel.
CVE-2020-8834 has a severity rating of high.
CVE-2020-8834 affects Linux kernel versions 4.15.0-96.97 and 4.18~.
To fix CVE-2020-8834, update your Linux kernel to version 4.15.0-96.97 or 4.18~.
You can find more information about CVE-2020-8834 on the Ubuntu Security Notice (USN) page and the Openwall mailing list.