First published: Mon Jun 15 2020(Updated: )
A flaw was found in how the ACPI table loading through acpi_configfs was handled when the kernel was locked down. This flaw allows a (root) privileged local user to circumvent the kernel lockdown restrictions. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-193.14.3.rt13.67.el8_2 | 0:4.18.0-193.14.3.rt13.67.el8_2 |
redhat/kernel | <0:4.18.0-193.14.3.el8_2 | 0:4.18.0-193.14.3.el8_2 |
redhat/kernel | <0:4.18.0-80.27.2.el8_0 | 0:4.18.0-80.27.2.el8_0 |
redhat/kernel | <0:4.18.0-147.24.2.el8_1 | 0:4.18.0-147.24.2.el8_1 |
Linux Kernel | <5.7.7 | |
SUSE Linux | =15.1 | |
SUSE Linux | =15.2 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =20.04 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 |
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-15780 has a high severity rating, primarily affecting data confidentiality and integrity.
To mitigate CVE-2020-15780, update your kernel to the remedied versions provided by your Linux distribution.
CVE-2020-15780 affects several Linux kernel versions including Red Hat, OpenSUSE, and Ubuntu systems.
Local users with root privileges are at risk of circumventing kernel lockdown restrictions due to CVE-2020-15780.
There are no known workarounds for CVE-2020-15780; the best option is to upgrade to secure kernel versions.