It was found that the Linux kernel's Intel early microcode loader was vulnerable to a stack overflow. On a UEFI Secure Boot enabled system, a local root user could use this flaw to increase their privileges to the kernel (ring0) level despite the additional restrictions in place. Upstream fix: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit?id=f84598bd7c851f8b0bf8cd0d7c3be0d73c432ff4
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1204724]
Statement: This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enteprise MRG 2. Future kernel and kernel-rt updates for Red Hat Enterprise Linux 7 may address this issue.
kernel-3.19.2-201.fc21 has been pushed to the Fedora 21 stable repository. If problems still persist, please make note of it in this bug report.
kernel-3.19.3-100.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2015:1565 https://access.redhat.com/errata/RHSA-2015:1565
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2015:1534 https://rhn.redhat.com/errata/RHSA-2015-1534.html