Vulnerability Description
The Linux Kernel lockdown mode for kernel versions starting on 6.12 and above for Fedora Linux has the lockdown mode disabled without any warning. This may allow an attacker to gain access to sensitive information such kernel memory mappings, I/O ports, BPF and kprobes. Additionally unsigned modules can be loaded, leading to execution of untrusted code breaking breaking any Secure Boot protection. This vulnerability affects only Fedora Linux.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHSA-2025:6966
- https://access.redhat.com/security/cve/CVE-2025-1272
- https://bugzilla.redhat.com/show_bug.cgi?id=2345615
FAQ
What is CVE-2025-1272?
CVE-2025-1272 is a vulnerability with a CVSS score of 7.7 (HIGH). The Linux Kernel lockdown mode for kernel versions starting on 6.12 and above for Fedora Linux has the lockdown mode disabled without any warning. This may allow an attacker to gain access to sensitiv...
How severe is CVE-2025-1272?
CVE-2025-1272 has been rated HIGH with a CVSS base score of 7.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-1272?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.