Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:18237
HistoryMay 02, 2019 - 6:36 a.m.

Signature Verification Bypass

2019-05-0206:36:12
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
11

0.001 Low

EPSS

Percentile

26.4%

Linux kernel is vulnerable to signature validation bypass attacks. This is because the root can gain direct access to an internal keyring, such as ‘.dns_resolver’ in RHEL-7 or ‘.builtin_trusted_keys’ upstream, by joining it as its session keyring.Root user could bypass module signature verification by adding a new public key of its own devising to the keyring.

References