6.7 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
kernel is vulnerable to arbitrary code execution. The vulnerability exists through lockdown with a bypass through ACPI write via acpi_configfs.
lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html
lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html
www.openwall.com/lists/oss-security/2020/07/20/7
www.openwall.com/lists/oss-security/2020/07/29/3
www.openwall.com/lists/oss-security/2020/07/30/2
www.openwall.com/lists/oss-security/2020/07/30/3
access.redhat.com/errata/RHSA-2020:3218
access.redhat.com/security/updates/classification/#moderate
access.redhat.com/security/vulnerabilities/grub2bootloader
cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.7
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=75b0cea7bf307f362057cc778efe89af4c615354
git.zx2c4.com/american-unsigned-language/tree/american-unsigned-language-2.sh
usn.ubuntu.com/4425-1/
usn.ubuntu.com/4426-1/
usn.ubuntu.com/4439-1/
usn.ubuntu.com/4440-1/
www.openwall.com/lists/oss-security/2020/06/15/3
6.7 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C