First published: Fri Apr 22 2016(Updated: )
A vulnerability was found in the RHEL7.2 kernel. When RHEL 7.2 is booted with UEFI Secure Boot enabled, securelevel is set. The kernel uses the state of securelevel to prevent userspace from inserting untrusted privileged code at runtime. The ACPI tables provided by firmware can be overwritten using the initrd. From the kernel documentation: If the ACPI_INITRD_TABLE_OVERRIDE compile option is true, it is possible to override nearly any ACPI table provided by the BIOS with an instrumented, modified one. RHEL 7.2 has CONFIG_ACPI_INITRD_TABLE_OVERRIDE kernel config option enabled, and will load ACPI tables appended to the initrd, even if booted with UEFI Secure Boot enabled and securelevel set. Upstream patch: <a href="https://github.com/mjg59/linux/commit/a4a5ed2835e8ea042868b7401dced3f517cafa76">https://github.com/mjg59/linux/commit/a4a5ed2835e8ea042868b7401dced3f517cafa76</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1329653 is classified as critical, as it affects the kernel security features in RHEL 7.2.
To fix REDHAT-BUG-1329653, apply the latest security patches released by Red Hat for RHEL 7.2.
REDHAT-BUG-1329653 specifically affects Red Hat Enterprise Linux 7.2.
The potential impacts of REDHAT-BUG-1329653 include unauthorized execution of untrusted code and compromise of system integrity.
Yes, REDHAT-BUG-1329653 is related to UEFI Secure Boot as it involves kernel behavior when booting with Secure Boot enabled.