CVE-2020-15780
Published at:
-
16-07-2020 12:15
Last modified:
-
26-10-2022 01:44
Total changes:
-
5
Description
Common Vulnerability Scoring System (CVSS)
Low
Attack complexity
Local
Attack vector
High
Availability
High
Confidentiality
High
Integrity
High
Privileges required
Unchanged
Scope
None
User interaction
6.7
Base score
0.8
5.9
Exploitability score
Impact score
Verification logic
Reference
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=75b0cea7bf307f362057cc778efe89af4c615354
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.7
- https://git.zx2c4.com/american-unsigned-language/tree/american-unsigned-language-2.sh
- https://www.openwall.com/lists/oss-security/2020/06/15/3
- [oss-security] 20200720 Re: Re: lockdown bypass on mainline kernel for loading unsigned modules-Mailing List, Patch, Third Party Advisory
- [oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilities-Mailing List, Third Party Advisory
- [oss-security] 20200730 UEFI SecureBoot bypass fixes rolled out to kernels below radar-Mailing List, Third Party Advisory
- [oss-security] 20200730 Re: UEFI SecureBoot bypass fixes rolled out to kernels below radar-Mailing List, Third Party Advisory
- USN-4439-1-Third Party Advisory
- USN-4425-1-Third Party Advisory
- USN-4426-1-Third Party Advisory
- USN-4440-1-Third Party Advisory
- openSUSE-SU-2020:1153-Mailing List, Third Party Advisory
- openSUSE-SU-2020:1236-Mailing List, Third Party Advisory
Keywords