CVE Vulnerabilities

CVE-2016-3699

Published: Oct 07, 2016 | Modified: Feb 13, 2023
CVSS 3.x
7.4
HIGH
Source:
NVD
CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
6.9 MEDIUM
AV:L/AC:M/Au:N/C:C/I:C/A:C
RedHat/V2
3.3 LOW
AV:L/AC:M/Au:N/C:N/I:P/A:P
RedHat/V3
Ubuntu
LOW

The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.

Affected Software

Name Vendor Start Version End Version
Linux_kernel Linux - (including) - (including)
Enterprise_mrg Redhat 2.0 (including) 2.0 (including)
Linux Redhat 7.2 (including) 7.2 (including)
Red Hat Enterprise Linux 7 RedHat kernel-rt-0:3.10.0-514.rt56.420.el7 *
Red Hat Enterprise Linux 7 RedHat kernel-0:3.10.0-514.el7 *
Linux-flo Ubuntu trusty *
Linux-goldfish Ubuntu trusty *
Linux-grouper Ubuntu trusty *
Linux-linaro-omap Ubuntu precise *
Linux-linaro-shared Ubuntu precise *
Linux-linaro-vexpress Ubuntu precise *
Linux-lts-quantal Ubuntu precise *
Linux-lts-raring Ubuntu precise *
Linux-lts-saucy Ubuntu precise *
Linux-lts-utopic Ubuntu trusty *
Linux-lts-wily Ubuntu trusty *
Linux-maguro Ubuntu trusty *
Linux-mako Ubuntu trusty *
Linux-manta Ubuntu trusty *
Linux-qcm-msm Ubuntu precise *

References