Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-27777

Опубликовано: 15 дек. 2020
Источник: debian
EPSS Низкий

Описание

A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed5.9.6-1package
linuxfixed4.19.160-1busterpackage
linuxignoredstretchpackage

Примечания

  • https://git.kernel.org/linus/bd59380c5ba4147dcbaad3e582b55ccfd120b764

EPSS

Процентиль: 6%
0.00027
Низкий

Связанные уязвимости

CVSS3: 6.7
ubuntu
больше 4 лет назад

A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.

CVSS3: 6.4
redhat
почти 5 лет назад

A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.

CVSS3: 6.7
nvd
больше 4 лет назад

A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.

CVSS3: 6.7
msrc
больше 4 лет назад

Описание отсутствует

CVSS3: 6.7
github
около 3 лет назад

A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.

EPSS

Процентиль: 6%
0.00027
Низкий