kernel is vulnerable to arbitrary code execution. The vulnerability exists through lockdown with a bypass through ACPI write via acpi_configfs.
lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html
lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html
www.openwall.com/lists/oss-security/2020/07/20/7
www.openwall.com/lists/oss-security/2020/07/29/3
www.openwall.com/lists/oss-security/2020/07/30/2
www.openwall.com/lists/oss-security/2020/07/30/3
access.redhat.com/errata/RHSA-2020:3218
access.redhat.com/security/updates/classification/#moderate
access.redhat.com/security/vulnerabilities/grub2bootloader
cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.7
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=75b0cea7bf307f362057cc778efe89af4c615354
git.zx2c4.com/american-unsigned-language/tree/american-unsigned-language-2.sh
usn.ubuntu.com/4425-1/
usn.ubuntu.com/4426-1/
usn.ubuntu.com/4439-1/
usn.ubuntu.com/4440-1/
www.openwall.com/lists/oss-security/2020/06/15/3