First published: Thu Mar 31 2016(Updated: )
It was found that EINJ, error injection mechanism, is allowed even if securelevel, a prevention from userspace performing actions that undermine trust in the platform, is enabled. This can have undesirable side-effects, such as causing the platform to mark hardware as needing replacement. Product bug: <a class="bz_bug_link bz_secure " title="" href="show_bug.cgi?id=1321639">https://bugzilla.redhat.com/show_bug.cgi?id=1321639</a> Upstream patch: <a href="https://github.com/mjg59/linux/commit/d7a6be58edc01b1c66ecd8fcc91236bfbce0a420">https://github.com/mjg59/linux/commit/d7a6be58edc01b1c66ecd8fcc91236bfbce0a420</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1322755 is significant due to the potential for system instability and hardware misreporting.
To fix REDHAT-BUG-1322755, ensure that the EINJ error injection mechanism is disabled when securelevel is enabled.
REDHAT-BUG-1322755 affects Red Hat Linux environments where the securelevel feature is in use.
The potential impacts of REDHAT-BUG-1322755 include erroneous hardware replacement markings and compromised system trust.
A temporary workaround for REDHAT-BUG-1322755 is to carefully manage securelevel settings and disable EINJ if necessary.