Vulnerability Name: | CVE-2015-7837 (CCN-107230) | ||||||||||||||||||||||||||||||||
Assigned: | 2015-10-14 | ||||||||||||||||||||||||||||||||
Published: | 2015-10-14 | ||||||||||||||||||||||||||||||||
Updated: | 2021-07-15 | ||||||||||||||||||||||||||||||||
Summary: | The Linux kernel, as used in Red Hat Enterprise Linux 7, kernel-rt, and Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended securelevel/secureboot restrictions by leveraging improper handling of secure_boot flag across kexec reboot. | ||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N) 4.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
3.5 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N)
| ||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-254 CWE-456 | ||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2015-7837 Source: REDHAT Type: Vendor Advisory RHSA-2015:2152 Source: REDHAT Type: Vendor Advisory RHSA-2015:2411 Source: CCN Type: oss-sec Mailing List, Thu, 15 Oct 2015 02:35:02 -0400 (EDT) CVE Request - Linux kernel - securelevel/secureboot bypass Source: CCN Type: oss-sec Mailing List, Thu, 15 Oct 2015 12:58:50 -0400 (EDT) Re: CVE Request - Linux kernel - securelevel/secureboot bypass Source: CCN Type: IBM Security Bulletin T1024270 (PowerKVM) Vulnerabilities in the Linux kernel affect PowerKVM Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20151015 Re: CVE Request - Linux kernel - securelevel/secureboot bypass. Source: BID Type: Third Party Advisory, VDB Entry 77097 Source: CCN Type: BID-77097 Linux Kernel 'securelevel/secureboot' Local Security Bypass Vulnerability Source: CCN Type: Red Hat Bugzilla Bug 1272472 (CVE-2015-7837) CVE-2015-7837 kernel: securelevel disabled after kexec Source: CONFIRM Type: Issue Tracking, Vendor Advisory https://bugzilla.redhat.com/show_bug.cgi?id=1272472 Source: XF Type: UNKNOWN linux-kernel-cve20157837-sec-bypass(107230) Source: CONFIRM Type: Issue Tracking, Third Party Advisory https://github.com/mjg59/linux/commit/4b2b64d5a6ebc84214755ebccd599baef7c1b798 | ||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Configuration RedHat 6: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
BACK |