{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-21505","assignerOrgId":"43595867-4340-4103-b7a2-9a5208d29a85","state":"PUBLISHED","assignerShortName":"oracle","dateReserved":"2021-11-15T19:29:08.891Z","datePublished":"2024-12-24T18:48:23.588Z","dateUpdated":"2024-12-27T16:52:05.331Z"},"containers":{"cna":{"affected":[{"product":"Oracle Linux","vendor":"Oracle Corporation","versions":[{"status":"affected","version":"Oracle Linux: 7"},{"status":"affected","version":"Oracle Linux: 8"},{"status":"affected","version":"Oracle Linux: 9"}]}],"descriptions":[{"lang":"en","value":"In the linux kernel, if IMA appraisal is used with the \"ima_appraise=log\" boot param, lockdown can be defeated with kexec on any machine when Secure Boot is disabled or unavailable. IMA prevents setting \"ima_appraise=log\" from the boot param when Secure Boot is enabled, but this does not cover cases where lockdown is used without Secure Boot. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity, Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":6.7,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"description":"In the linux kernel, if IMA appraisal is used with the \"ima_appraise=log\" boot param, lockdown can be defeated with kexec on any machine when Secure Boot is disabled or unavailable. IMA prevents setting \"ima_appraise=log\" from the boot param when Secure Boot is enabled, but this does not cover cases where lockdown is used without Secure Boot. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity, Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).","lang":"en","type":"text"}]}],"providerMetadata":{"orgId":"43595867-4340-4103-b7a2-9a5208d29a85","shortName":"oracle","dateUpdated":"2024-12-24T18:48:23.588Z"},"references":[{"name":"Github commit","tags":["issue-tracking"],"url":"https://git.kernel.org/linus/543ce63b664e2c2f9533d089a4664b559c3e6b5b"},{"name":"Oracle Advisory","tags":["vendor-advisory"],"url":"https://linux.oracle.com/cve/CVE-2022-21505.html"}]},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-346","lang":"en","description":"CWE-346 Origin Validation Error"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-12-27T16:51:57.672286Z","id":"CVE-2022-21505","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-12-27T16:52:05.331Z"}}]}}