CVE Vulnerabilities

CVE-2016-3699

Published: Oct 07, 2016 | Modified: Feb 13, 2023
CVSS 3.x
7.4
HIGH
Source:
NVD
CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
6.9 MEDIUM
AV:L/AC:M/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
Ubuntu

The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.

Affected Software

Name Vendor Start Version End Version
Linux_kernel Linux - (including) - (including)
Enterprise_mrg Redhat 2.0 (including) 2.0 (including)
Linux Redhat 7.2 (including) 7.2 (including)

References