SB2020073049 - Red Hat Enterprise Linux 8 update for kernel-rt
Published: July 30, 2020 Updated: December 28, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Incorrect default permissions (CVE-ID: CVE-2019-20908)
The vulnerability allows a local privileged user to execute arbitrary code.
An issue was discovered in drivers/firmware/efi/efi.c in the Linux kernel before 5.4. Incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032.
2) Out-of-bounds Write (CVE-ID: CVE-2020-10713)
The vulnerability allows a local attacker to compromise vulnerable system.
The vulnerability exists due to a "BootHole" issue. An attacker with physical access can install persistent and stealthy bootkits or malicious bootloaders, trigger out-of-bounds write and execute arbitrary code on the target system.
3) Improper Authorization (CVE-ID: CVE-2020-15780)
The vulnerability allows a local user to bypass authorization checks.
The vulnerability exists due to improper authorization in "in drivers/acpi/acpi_configfs.c". A local administrator can inject malicious ACPI tables via configfs to bypass lockdown and secure boot restrictions.
Remediation
Install update from vendor's website.