{"id":"CVE-2020-15780","details":"An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.","modified":"2026-04-16T04:34:17.268466454Z","published":"2020-07-15T22:15:14.047Z","related":["SUSE-SU-2020:2027-1","SUSE-SU-2020:2103-1","SUSE-SU-2020:2105-1","SUSE-SU-2020:2106-1","SUSE-SU-2020:2107-1","SUSE-SU-2020:2119-1","SUSE-SU-2020:2121-1","SUSE-SU-2020:2122-1","SUSE-SU-2020:2478-1","SUSE-SU-2020:2487-1","SUSE-SU-2020:2505-1","SUSE-SU-2020:2506-1","SUSE-SU-2020:2507-1","SUSE-SU-2020:2508-1","SUSE-SU-2020:2509-1","SUSE-SU-2020:2513-1","SUSE-SU-2020:2515-1","SUSE-SU-2020:2517-1","SUSE-SU-2020:2524-1","SUSE-SU-2020:2526-1","SUSE-SU-2020:2531-1","openSUSE-SU-2020:1153-1","openSUSE-SU-2020:1236-1","openSUSE-SU-2021:0242-1"],"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2020/07/29/3"},{"type":"ADVISORY","url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.7"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4425-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4439-1/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2020/07/30/2"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2020/07/30/3"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4426-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4440-1/"},{"type":"ADVISORY","url":"https://www.openwall.com/lists/oss-security/2020/06/15/3"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2020/07/20/7"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=75b0cea7bf307f362057cc778efe89af4c615354"},{"type":"FIX","url":"https://git.zx2c4.com/american-unsigned-language/tree/american-unsigned-language-2.sh"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-15780.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"5.7.7"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]},{"events":[{"introduced":"0"},{"last_affected":"15.2"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"20.04"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}]}