vulnerability
Arch Linux: Access restriction bypass (CVE-2020-27779)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:M/Au:N/C:C/I:C/A:C) | Mar 3, 2021 | Jul 11, 2025 | Nov 27, 2025 |
Severity
7
CVSS
(AV:L/AC:M/Au:N/C:C/I:C/A:C)
Published
Mar 3, 2021
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
The GRUB2's cutmem command does not honor Secure Boot locking. This allows an privileged attacker to remove address ranges from memory creating an opportunity to circumvent Secure Boot protections after proper triage of grub's memory layout.
Solution
arch-linux-upgrade-latest
References
- CVE-2020-27779
- https://attackerkb.com/topics/CVE-2020-27779
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=1900698
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZWZ36QK4IKU6MWDWNOOWKPH3WXZBHT2R/
- URL-https://security.archlinux.org/ASA-202106-43
- URL-https://security.gentoo.org/glsa/202104-05
- URL-https://security.netapp.com/advisory/ntap-20220325-0001/
- CWE-285
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.