As the Ubuntu kernel is quite modified, it was initially thought that it would be a specific vulnerability of this operating system. But Jason Donenfeld, the WireGuard developer who discovered the vulnerability, found another very similar security flaw in the main branch of the Linux kernel. He has managed to exploit it by also injecting ACPI tables and handling to disable Lockdown completely.
This security hole is more delicate than the one found in Ubuntu, since it is not necessary to restart the system to exploit it. The root of the problem is in the ACPI ConfigFS module, which lets you add arbitrary tables at runtime.
Donenfeld has verified that even can break the security of the system with Secure Boot enabled. He has successfully loaded arbitrary unsigned kernel modules onto the system.
Fortunately, the developer himself has created and released the patch that fixes this vulnerability**. They are just five lines of code whose job is to check the Lockdown status before giving the green light to writing ACPI tables.
More information: MuyLinux