Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2025-1272

Опубликовано: 18 фев. 2026
Источник: nvd
CVSS3: 7.7
EPSS Низкий

Описание

The Linux Kernel lockdown mode for kernel versions starting on 6.12 and above for Fedora Linux has the lockdown mode disabled without any warning. This may allow an attacker to gain access to sensitive information such kernel memory mappings, I/O ports, BPF and kprobes. Additionally unsigned modules can be loaded, leading to execution of untrusted code breaking breaking any Secure Boot protection. This vulnerability affects only Fedora Linux.

EPSS

Процентиль: 1%
0.00011
Низкий

7.7 High

CVSS3

Дефекты

CWE-306

Связанные уязвимости

CVSS3: 7.7
ubuntu
около 1 месяца назад

The Linux Kernel lockdown mode for kernel versions starting on 6.12 and above for Fedora Linux has the lockdown mode disabled without any warning. This may allow an attacker to gain access to sensitive information such kernel memory mappings, I/O ports, BPF and kprobes. Additionally unsigned modules can be loaded, leading to execution of untrusted code breaking breaking any Secure Boot protection. This vulnerability affects only Fedora Linux.

CVSS3: 7.7
redhat
около 1 года назад

The Linux Kernel lockdown mode for kernel versions starting on 6.12 and above for Fedora Linux has the lockdown mode disabled without any warning. This may allow an attacker to gain access to sensitive information such kernel memory mappings, I/O ports, BPF and kprobes. Additionally unsigned modules can be loaded, leading to execution of untrusted code breaking breaking any Secure Boot protection. This vulnerability affects only Fedora Linux.

CVSS3: 7.7
debian
около 1 месяца назад

The Linux Kernel lockdown mode for kernel versions starting on 6.12 an ...

CVSS3: 7.7
github
около 1 месяца назад

The Linux Kernel lockdown mode for kernel versions starting on 6.12 and above for Fedora Linux has the lockdown mode disabled without any warning. This may allow an attacker to gain access to sensitive information such kernel memory mappings, I/O ports, BPF and kprobes. Additionally unsigned modules can be loaded, leading to execution of untrusted code breaking breaking any Secure Boot protection. This vulnerability affects only Fedora Linux.

oracle-oval
10 месяцев назад

ELSA-2025-6966: kernel security update (MODERATE)

EPSS

Процентиль: 1%
0.00011
Низкий

7.7 High

CVSS3

Дефекты

CWE-306