First published: Tue Sep 15 2020(Updated: )
A flaw was found in the Linux kernel in certs/blacklist.c, When signature entries for EFI_CERT_X509_GUID are contained in the Secure Boot Forbidden Signature Database, the entries are skipped. This can cause a security threat and breach system integrity, confidentiality and even lead to a denial of service problem.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-305.7.1.rt7.79.el8_4 | 0:4.18.0-305.7.1.rt7.79.el8_4 |
redhat/kernel | <0:4.18.0-305.7.1.el8_4 | 0:4.18.0-305.7.1.el8_4 |
redhat/kernel | <0:4.18.0-147.51.1.el8_1 | 0:4.18.0-147.51.1.el8_1 |
redhat/kernel-rt | <0:4.18.0-193.60.2.rt13.112.el8_2 | 0:4.18.0-193.60.2.rt13.112.el8_2 |
redhat/kernel | <0:4.18.0-193.60.2.el8_2 | 0:4.18.0-193.60.2.el8_2 |
Linux Linux kernel | <=5.8.13 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.112-1 6.11.5-1 6.11.7-1 |
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)