CVE-2022-1665

A set of pre-production kernel packages of Red Hat Enterprise Linux for IBM Power architecture can be booted by the grub in Secure Boot mode even though it shouldn't. These kernel builds don't have the secure boot lockdown patches applied to it and can bypass the secure boot validations, allowing the attacker to load another non-trusted code.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=2089529 Issue Tracking Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2089529 Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 06:41

Type Values Removed Values Added
References () https://bugzilla.redhat.com/show_bug.cgi?id=2089529 - Issue Tracking, Vendor Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=2089529 - Issue Tracking, Vendor Advisory

Information

Published : 2022-06-21 15:15

Updated : 2024-11-21 06:41


NVD link : CVE-2022-1665

Mitre link : CVE-2022-1665

CVE.ORG link : CVE-2022-1665


JSON object : View

Products Affected

redhat

  • enterprise_linux
CWE
CWE-1291

Public Key Re-Use for Signing both Debug and Production Code

NVD-CWE-Other