The Linux Kernel lockdown mode for kernel versions starting on 6.12 and above for Fedora Linux has the lockdown mode disabled without any warning. This may allow an attacker to gain access to sensitive information such kernel memory mappings, I/O ports, BPF and kprobes. Additionally unsigned modules can be loaded, leading to execution of untrusted code breaking breaking any Secure Boot protection. This vulnerability affects only Fedora Linux.
Metrics
Affected Vendors & Products
References
History
Tue, 18 Feb 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | No description is available for this CVE. | The Linux Kernel lockdown mode for kernel versions starting on 6.12 and above for Fedora Linux has the lockdown mode disabled without any warning. This may allow an attacker to gain access to sensitive information such kernel memory mappings, I/O ports, BPF and kprobes. Additionally unsigned modules can be loaded, leading to execution of untrusted code breaking breaking any Secure Boot protection. This vulnerability affects only Fedora Linux. |
Sat, 15 Feb 2025 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | kernel: Kernel's lockdown disable on Fedora's kernel due to a regression | kernel: Secure Boot does not automatically enable kernel lockdown |
Fri, 14 Feb 2025 02:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | No description is available for this CVE. | |
Title | kernel: Kernel's lockdown disable on Fedora's kernel due to a regression | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|

No data.

No data.

No data.
