An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-15780.json"
[
{
"id": "CVE-2020-15780-56dee262",
"target": {
"file": "drivers/acpi/acpi_configfs.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@75b0cea7bf307f362057cc778efe89af4c615354",
"digest": {
"threshold": 0.9,
"line_hashes": [
"138925073475201788627327905251713584401",
"229199076199983932270492424049583975035",
"198781508635090513293005806093282869219",
"205945829793439808137782083284320768768",
"103869226139889439739942790734208463905",
"192211837059261980100519134859629849045",
"335547403770229836596061523202275949823",
"55717602796437761158951186053226697628"
]
},
"signature_type": "Line"
},
{
"id": "CVE-2020-15780-f80c22d0",
"target": {
"function": "acpi_table_aml_write",
"file": "drivers/acpi/acpi_configfs.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@75b0cea7bf307f362057cc778efe89af4c615354",
"digest": {
"function_hash": "201470278891678339783353162042514017346",
"length": 742.0
},
"signature_type": "Function"
}
]