CVE-2016-3699

The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:linux:7.2:*:*:*:*:*:*:*

History

21 Nov 2024, 02:50

Type Values Removed Values Added
References () http://rhn.redhat.com/errata/RHSA-2016-2574.html - () http://rhn.redhat.com/errata/RHSA-2016-2574.html -
References () http://rhn.redhat.com/errata/RHSA-2016-2584.html - () http://rhn.redhat.com/errata/RHSA-2016-2584.html -
References () http://www.openwall.com/lists/oss-security/2016/09/22/4 - Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/09/22/4 - Third Party Advisory
References () http://www.securityfocus.com/bid/93114 - Broken Link () http://www.securityfocus.com/bid/93114 - Broken Link
References () https://bugzilla.redhat.com/show_bug.cgi?id=1329653 - Issue Tracking, Patch, Third Party Advisory, VDB Entry () https://bugzilla.redhat.com/show_bug.cgi?id=1329653 - Issue Tracking, Patch, Third Party Advisory, VDB Entry
References () https://github.com/mjg59/linux/commit/a4a5ed2835e8ea042868b7401dced3f517cafa76 - Exploit () https://github.com/mjg59/linux/commit/a4a5ed2835e8ea042868b7401dced3f517cafa76 - Exploit

Information

Published : 2016-10-07 14:59

Updated : 2024-11-21 02:50


NVD link : CVE-2016-3699

Mitre link : CVE-2016-3699

CVE.ORG link : CVE-2016-3699


JSON object : View

Products Affected

redhat

  • enterprise_mrg
  • linux

linux

  • linux_kernel
CWE
CWE-264

Permissions, Privileges, and Access Controls