Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-1272

Опубликовано: 13 фев. 2025
Источник: redhat
CVSS3: 7.7

Описание

The Linux Kernel lockdown mode for kernel versions starting on 6.12 and above for Fedora Linux has the lockdown mode disabled without any warning. This may allow an attacker to gain access to sensitive information such kernel memory mappings, I/O ports, BPF and kprobes. Additionally unsigned modules can be loaded, leading to execution of untrusted code breaking breaking any Secure Boot protection. This vulnerability affects only Fedora Linux.

Отчет

This flaw doesn't affected any supported Red Hat product, as the kernel versions as shipped with it doesn't contain the commit which introduced the regression backported.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10kernelNot affected
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise Linux 8kernel-rtNot affected
Red Hat Enterprise Linux 9kernel-rtAffected
Red Hat OpenShift Container Platform 4rhcosNot affected
Red Hat Enterprise Linux 9kernelFixedRHSA-2025:696613.05.2025
Red Hat Enterprise Linux 9kernelFixedRHSA-2025:696613.05.2025

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=2345615kernel: Secure Boot does not automatically enable kernel lockdown

7.7 High

CVSS3

Связанные уязвимости

ubuntu
4 месяца назад

[Unknown description]

debian

Описание отсутствует

oracle-oval
около 1 месяца назад

ELSA-2025-6966: kernel security update (MODERATE)

7.7 High

CVSS3