First published: Mon Aug 19 2019(Updated: )
A flaw was found in how the ACPI table loading through the EFI variable (and the related efivar_ssdt boot option) was handled when the Linux kernel was locked down. This flaw allows a (root) privileged local user to circumvent the kernel lockdown restrictions. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-193.14.3.rt13.67.el8_2 | 0:4.18.0-193.14.3.rt13.67.el8_2 |
redhat/kernel | <0:4.18.0-193.14.3.el8_2 | 0:4.18.0-193.14.3.el8_2 |
redhat/kernel | <0:4.18.0-80.27.2.el8_0 | 0:4.18.0-80.27.2.el8_0 |
redhat/kernel | <0:4.18.0-147.24.2.el8_1 | 0:4.18.0-147.24.2.el8_1 |
Linux Kernel | <5.4 | |
SUSE Linux | =15.1 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 |
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-20908 is considered a high-severity vulnerability due to its potential to allow a privileged local user to bypass kernel lockdown restrictions.
To fix CVE-2019-20908, update to the latest versions of the kernel, specifically versions 0:4.18.0-193.14.3.rt13.67.el8_2 for Red Hat or the corresponding patched versions for Ubuntu and Debian.
CVE-2019-20908 affects users of the Linux kernel, particularly those running specific vulnerable versions across various distributions such as Red Hat, Ubuntu, and openSUSE.
There may be no visible symptoms for CVE-2019-20908 exploitation, as it allows unauthorized access to kernel functions when the system is running in a locked state.
CVE-2019-20908 cannot be exploited remotely; it requires local root privileges to circumvent kernel lockdown protections.