CVE Vulnerabilities

CVE-2016-3699

Published: Oct 07, 2016 | Modified: Apr 12, 2025
CVSS 3.x
7.4
HIGH
Source:
NVD
CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
6.9 MEDIUM
AV:L/AC:M/Au:N/C:C/I:C/A:C
RedHat/V2
3.3 LOW
AV:L/AC:M/Au:N/C:N/I:P/A:P
RedHat/V3
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.

Affected Software

NameVendorStart VersionEnd Version
Linux_kernelLinux- (including)- (including)
Enterprise_mrgRedhat2.0 (including)2.0 (including)
LinuxRedhat7.2 (including)7.2 (including)
Red Hat Enterprise Linux 7RedHatkernel-rt-0:3.10.0-514.rt56.420.el7*
Red Hat Enterprise Linux 7RedHatkernel-0:3.10.0-514.el7*
Linux-floUbuntutrusty*
Linux-goldfishUbuntutrusty*
Linux-grouperUbuntutrusty*
Linux-linaro-omapUbuntuprecise*
Linux-linaro-sharedUbuntuprecise*
Linux-linaro-vexpressUbuntuprecise*
Linux-lts-quantalUbuntuprecise*
Linux-lts-raringUbuntuprecise*
Linux-lts-saucyUbuntuprecise*
Linux-lts-utopicUbuntutrusty*
Linux-lts-wilyUbuntutrusty*
Linux-maguroUbuntutrusty*
Linux-makoUbuntutrusty*
Linux-mantaUbuntutrusty*
Linux-qcm-msmUbuntuprecise*

References