Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-15780 PoC — Linux kernel 安全漏洞

Source
Associated Vulnerability
Title:Linux kernel 安全漏洞 (CVE-2020-15780)
Description:An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.
Readme
## American Unsigned Language
#### by zx2c4

These are two exploits to disable kernel lockdown via ACPI table injection.

`american-unsigned-language.sh` is for Ubuntu 18.04 Bionic's 4.15 kernel with their custom patches and uses one technique. [CVE-2019-20908](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20908).

`american-unsigned-language-2.sh` is for mainline/upstream kernels and uses a different technique. [CVE-2020-15780](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15780).

Explanation is in the headers of each script.

![Demo](https://git.zx2c4.com/american-unsigned-language/blob/demo.gif)
File Snapshot

[4.0K] /data/pocs/8e64deb3a9989e391a5b55e7b0b0fe173b5eb02b ├── [4.5K] american-unsigned-language-2.sh ├── [6.0K] american-unsigned-language.sh ├── [206K] demo.gif └── [ 627] README.md 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →