The information-disclosure flaw allows KASLR bypass and the discovery of additional, unpatched vulnerabilities in ARM devices. The bug (CVE-2020-28588) exists in the /proc/pid/syscall functionality of 32-bit ARM devices running Linux. It arises from an improper conversion of numeric values when reading the file. With a few commands, attackers can output 24 bytes of uninitialized stack memory, which can be used to bypass kernel address space layout randomization (KASLR)
Source: https://threatpost.com/linux-kernel-bug-wider-cyberattacks/165640/

