A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.
2020-12-15T17:15:14.333
2024-11-21T05:21:48.973
Modified
CVSSv3.1: 6.7 (MEDIUM)
AV:L/AC:L/Au:N/C:C/I:C/A:C
3.9
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | linux | linux_kernel | < 4.14.204 | Yes |
Operating System | linux | linux_kernel | < 4.19.155 | Yes |
Operating System | linux | linux_kernel | < 5.4.75 | Yes |
Operating System | linux | linux_kernel | < 5.9.5 | Yes |
Application | redhat | openshift_container_platform | 4.4 | Yes |
Application | redhat | openshift_container_platform | 4.5 | Yes |
Application | redhat | openshift_container_platform | 4.6 | Yes |
Operating System | redhat | enterprise_linux | 5.0 | Yes |
Operating System | redhat | enterprise_linux | 6.0 | Yes |
Operating System | redhat | enterprise_linux | 7.0 | Yes |
Operating System | redhat | enterprise_linux | 8.0 | Yes |