CVE-2020-27777

CVSS v3.1 6.7 (Medium)
67% Progress
CVSS v2.0 7.2 (High)
72% Progress
EPSS 0.04 % (5th)
0.04% Progress
Affected Products 3
Advisories 39

A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.

Weaknesses
CWE-862
Missing Authorization
CVE Status
PUBLISHED
CNA
Red Hat, Inc.
Published Date
2020-12-15 17:15:14
(3 years ago)
Updated Date
2023-10-05 14:29:57
(11 months ago)

Affected Products

Loading...
Loading...
Loading...

Configuration #1

    CPE23 From Up To
  Linux Kernel prior 4.14.204 version cpe:2.3:o:linux:linux_kernel < 4.14.204
  Linux Kernel from 4.15 version and prior 4.19.155 version cpe:2.3:o:linux:linux_kernel >= 4.15 < 4.19.155
  Linux Kernel from 4.20 version and prior 5.4.75 version cpe:2.3:o:linux:linux_kernel >= 4.20 < 5.4.75
  Linux Kernel from 5.5 version and prior 5.9.5 version cpe:2.3:o:linux:linux_kernel >= 5.5 < 5.9.5

Configuration #2

    CPE23 From Up To
  Redhat Openshift Container Platform 4.4 cpe:2.3:a:redhat:openshift_container_platform:4.4
  Redhat Openshift Container Platform 4.5 cpe:2.3:a:redhat:openshift_container_platform:4.5
  Redhat Openshift Container Platform 4.6 cpe:2.3:a:redhat:openshift_container_platform:4.6
  Redhat Enterprise Linux 5.0 cpe:2.3:o:redhat:enterprise_linux:5.0
  Redhat Enterprise Linux 6.0 cpe:2.3:o:redhat:enterprise_linux:6.0
  Redhat Enterprise Linux 7.0 cpe:2.3:o:redhat:enterprise_linux:7.0
  Redhat Enterprise Linux 8.0 cpe:2.3:o:redhat:enterprise_linux:8.0
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...