CVE-2022-1665

A set of pre-production kernel packages of Red Hat Enterprise Linux for IBM Power architecture can be booted by the grub in Secure Boot mode even though it shouldn't. These kernel builds don't have the secure boot lockdown patches applied to it and can bypass the secure boot validations, allowing the attacker to load another non-trusted code.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=2089529 Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

History

18 Aug 2022, 13:49

Type Values Removed Values Added
CVSS v2 : 4.6
v3 : 8.8
v2 : 4.6
v3 : 8.2

29 Jun 2022, 13:37

Type Values Removed Values Added
References (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2089529 - (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2089529 - Issue Tracking, Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 4.6
v3 : 8.8
CWE NVD-CWE-Other
CPE cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
First Time Redhat
Redhat enterprise Linux

21 Jun 2022, 15:34

Type Values Removed Values Added
New CVE

Information

Published : 2022-06-21 15:15

Updated : 2023-12-10 14:22


NVD link : CVE-2022-1665

Mitre link : CVE-2022-1665

CVE.ORG link : CVE-2022-1665


JSON object : View

Products Affected

redhat

  • enterprise_linux
CWE
NVD-CWE-Other CWE-1291

Public Key Re-Use for Signing both Debug and Production Code