Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-1665

Опубликовано: 07 июн. 2022
Источник: redhat
CVSS3: 8.2
EPSS Низкий

Описание

A set of pre-production kernel packages of Red Hat Enterprise Linux for IBM Power architecture can be booted by the grub in Secure Boot mode even though it shouldn't. These kernel builds don't have the secure boot lockdown patches applied to it and can bypass the secure boot validations, allowing the attacker to load another non-trusted code.

A flaw was found in the Linux kernel, where a set of pre-production kernel packages of Red Hat Enterprise Linux for IBM Power architecture were signed with Red Hat's production secure boot keys. This issue allows kernel versions targeted for testing to eventually boot in PowerPC environments with the Secure Boot feature enabled. An attacker needs high privilege to install the non-production kernel packages in the target machine and make it the default boot option on grub2.

Отчет

The RHEL 8 kernel SRPM has a means to build a blacklist of sha256 hashes of bad kernels that can be added to. This should prevent kexec from booting them. If it's the bootloader booting them, then that's before the kernel is even loaded and isn't a kernel problem. Such hashes may also be added to the blacklist table of a UEFI BIOS.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 8kernelAffected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-1291
https://bugzilla.redhat.com/show_bug.cgi?id=2089529Power: Signed build of Red Hat Enterprise Linux for IBM Power can boot pre-production kernels

EPSS

Процентиль: 21%
0.00068
Низкий

8.2 High

CVSS3

Связанные уязвимости

CVSS3: 8.2
nvd
больше 3 лет назад

A set of pre-production kernel packages of Red Hat Enterprise Linux for IBM Power architecture can be booted by the grub in Secure Boot mode even though it shouldn't. These kernel builds don't have the secure boot lockdown patches applied to it and can bypass the secure boot validations, allowing the attacker to load another non-trusted code.

CVSS3: 8.8
github
больше 3 лет назад

A set of pre-production kernel packages of Red Hat Enterprise Linux for IBM Power architecture can be booted by the grub in Secure Boot mode even though it shouldn't. These kernel builds don't have the secure boot lockdown patches applied to it and can bypass the secure boot validations, allowing the attacker to load another non-trusted code.

EPSS

Процентиль: 21%
0.00068
Низкий

8.2 High

CVSS3

Уязвимость CVE-2022-1665