In the linux kernel, if IMA appraisal is used with the "ima_appraise=log" boot param, lockdown can be defeated with kexec on any machine when Secure Boot is disabled or unavailable. IMA prevents setting "ima_appraise=log" from the boot param when Secure Boot is enabled, but this does not cover cases where lockdown is used without Secure Boot. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity, Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
History

Fri, 27 Dec 2024 17:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-346
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 24 Dec 2024 19:00:00 +0000

Type Values Removed Values Added
Description An authentication bypass flaw was found in the Linux kernel’s IMA policy when a user performs lockdown. This flaw allows a local user to crash or potentially escalate their privileges on the system. In the linux kernel, if IMA appraisal is used with the "ima_appraise=log" boot param, lockdown can be defeated with kexec on any machine when Secure Boot is disabled or unavailable. IMA prevents setting "ima_appraise=log" from the boot param when Secure Boot is enabled, but this does not cover cases where lockdown is used without Secure Boot. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity, Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
References

cve-icon MITRE

Status: PUBLISHED

Assigner: oracle

Published:

Updated: 2024-12-27T16:52:05.331Z

Reserved: 2021-11-15T19:29:08.891Z

Link: CVE-2022-21505

cve-icon Vulnrichment

Updated: 2024-12-27T16:50:57.849Z

cve-icon NVD

Status : Received

Published: 2024-12-24T19:15:06.763

Modified: 2024-12-27T17:15:06.320

Link: CVE-2022-21505

cve-icon Redhat

Severity : Moderate

Publid Date: 2022-07-19T00:00:00Z

Links: CVE-2022-21505 - Bugzilla