{"id":"CVE-2020-27777","details":"A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.","modified":"2026-03-15T13:45:06.518688Z","published":"2020-12-15T17:15:14.333Z","related":["ALSA-2021:4356","SUSE-SU-2020:3713-1","SUSE-SU-2020:3714-1","SUSE-SU-2020:3715-1","SUSE-SU-2020:3717-1","SUSE-SU-2020:3718-1","SUSE-SU-2020:3748-1","SUSE-SU-2020:3764-1","SUSE-SU-2020:3766-1","SUSE-SU-2020:3798-1","SUSE-SU-2021:0094-1","SUSE-SU-2021:0095-1","SUSE-SU-2021:0097-1","SUSE-SU-2021:0098-1","SUSE-SU-2021:0108-1","SUSE-SU-2021:0117-1","SUSE-SU-2021:0118-1","SUSE-SU-2021:0133-1","SUSE-SU-2021:0434-1","SUSE-SU-2021:0437-1","SUSE-SU-2021:0438-1","SUSE-SU-2021:0452-1","SUSE-SU-2021:14630-1","openSUSE-SU-2020:2161-1","openSUSE-SU-2020:2193-1","openSUSE-SU-2020:2260-1","openSUSE-SU-2021:0060-1","openSUSE-SU-2021:0075-1","openSUSE-SU-2021:0242-1"],"references":[{"type":"ADVISORY","url":"https://www.openwall.com/lists/oss-security/2020/11/23/2"},{"type":"FIX","url":"https://www.openwall.com/lists/oss-security/2020/10/09/1"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1900844"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?h=next&id=bd59380c5ba4147dcbaad3e582b55ccfd120b764"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"4.14.204"}]},{"events":[{"introduced":"4.15"},{"fixed":"4.19.155"}]},{"events":[{"introduced":"4.20"},{"fixed":"5.4.75"}]},{"events":[{"introduced":"5.5"},{"fixed":"5.9.5"}]},{"events":[{"introduced":"0"},{"last_affected":"4.4"}]},{"events":[{"introduced":"0"},{"last_affected":"4.5"}]},{"events":[{"introduced":"0"},{"last_affected":"4.6"}]},{"events":[{"introduced":"0"},{"last_affected":"5.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-27777.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}]}