Re: Linux kernel: powerpc: RTAS calls can be used to compromise kernel integrity

Related Vulnerabilities: CVE-2020-27777  
                							

                <!--X-Body-Begin-->
<!--X-User-Header-->

oss-sec
mailing list archives
<!--X-User-Header-End-->
<!--X-TopPNI-->

By Date

By Thread

</form>

<!--X-TopPNI-End-->
<!--X-MsgBody-->
<!--X-Subject-Header-Begin-->
Re: Linux kernel: powerpc: RTAS calls can be used to compromise kernel integrity

<!--X-Subject-Header-End-->
<!--X-Head-of-Message-->

From: Andrew Donnellan &lt;ajd () linux ibm com&gt;

Date: Tue, 24 Nov 2020 01:41:13 +1100

<!--X-Head-of-Message-End-->
<!--X-Head-Body-Sep-Begin-->

<!--X-Head-Body-Sep-End-->
<!--X-Body-of-Message-->
On 9/10/20 12:20 pm, Andrew Donnellan wrote:
The Linux kernel for powerpc has an issue with the Run-Time Abstraction 
Services (RTAS) interface, allowing root (or CAP_SYS_ADMIN users) in a 
VM to overwrite some parts of memory, including kernel memory.

This issue impacts guests running on top of PowerVM or KVM hypervisors 
(pseries platform), and does *not* impact bare-metal machines (powernv 
platform).
CVE-2020-27777 has been assigned.

--
Andrew Donnellan              OzLabs, ADL Canberra
ajd () linux ibm com             IBM Australia Limited

<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->

<!--X-Follow-Ups-End-->
<!--X-References-->
<!--X-References-End-->
<!--X-BotPNI-->

By Date

By Thread

Current thread:

Linux kernel: powerpc: RTAS calls can be used to compromise kernel integrity Andrew Donnellan (Oct 09)

Re: Linux kernel: powerpc: RTAS calls can be used to compromise kernel integrity Andrew Donnellan (Nov 23)

Re: Linux kernel: powerpc: RTAS calls can be used to compromise kernel integrity Andrew Donnellan (Dec 10)

<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->