Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-15780

Опубликовано: 15 июл. 2020
Источник: debian
EPSS Низкий

Описание

An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed5.7.10-1package
linuxfixed4.19.146-1busterpackage
linuxignoredstretchpackage

Примечания

  • https://www.openwall.com/lists/oss-security/2020/06/15/3

  • Fixed by: https://git.kernel.org/linus/75b0cea7bf307f362057cc778efe89af4c615354

EPSS

Процентиль: 73%
0.00776
Низкий

Связанные уязвимости

CVSS3: 6.7
ubuntu
около 5 лет назад

An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.

CVSS3: 6.4
redhat
больше 5 лет назад

An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.

CVSS3: 6.7
nvd
около 5 лет назад

An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.

CVSS3: 6.7
msrc
около 5 лет назад

Описание отсутствует

CVSS3: 6.7
github
больше 3 лет назад

An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.

EPSS

Процентиль: 73%
0.00776
Низкий