In the linux kernel, if IMA appraisal is used with the "ima_appraise=log" boot param, lockdown can be defeated with kexec on any machine when Secure Boot is disabled or unavailable. IMA prevents setting "ima_appraise=log" from the boot param when Secure Boot is enabled, but this does not cover cases where lockdown is used without Secure Boot. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity, Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
Metrics
Affected Vendors & Products
References
History
Fri, 27 Dec 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-346 | |
Metrics |
ssvc
|
Tue, 24 Dec 2024 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An authentication bypass flaw was found in the Linux kernel’s IMA policy when a user performs lockdown. This flaw allows a local user to crash or potentially escalate their privileges on the system. | In the linux kernel, if IMA appraisal is used with the "ima_appraise=log" boot param, lockdown can be defeated with kexec on any machine when Secure Boot is disabled or unavailable. IMA prevents setting "ima_appraise=log" from the boot param when Secure Boot is enabled, but this does not cover cases where lockdown is used without Secure Boot. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity, Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). |
References |
|

Status: PUBLISHED
Assigner: oracle
Published:
Updated: 2024-12-27T16:52:05.331Z
Reserved: 2021-11-15T19:29:08.891Z
Link: CVE-2022-21505

Updated: 2024-12-27T16:50:57.849Z

Status : Received
Published: 2024-12-24T19:15:06.763
Modified: 2024-12-27T17:15:06.320
Link: CVE-2022-21505
