The Linux kernel's privcmd driver can be abused to circumvent kernel lockdown (secure boot), e.g. by modifying page tables to enable user mode to modify kernel memory.
| Vendor | Product | Versions |
|---|---|---|
| Xen | privcmd driver | 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2, 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2, 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2, 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2, 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 |
Updated vendor to Xen, product to privcmd driver, severity to HIGH, and added CWE-284 and exploit availability.
Updated description to include details on how the privcmd driver can circumvent kernel lockdown, changed severity to HIGH, and added CWE-284.
Initial creation