CVE-2016-3699

The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:linux:7.2:*:*:*:*:*:*:*

History

13 Feb 2023, 04:50

Type Values Removed Values Added
References
  • {'url': 'https://access.redhat.com/security/cve/CVE-2016-3699', 'name': 'https://access.redhat.com/security/cve/CVE-2016-3699', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2016:2584', 'name': 'https://access.redhat.com/errata/RHSA-2016:2584', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2016:2574', 'name': 'https://access.redhat.com/errata/RHSA-2016:2574', 'tags': [], 'refsource': 'MISC'}
Summary CVE-2016-3699 kernel: ACPI table override allowed when securelevel is enabled The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.

02 Feb 2023, 16:17

Type Values Removed Values Added
Summary The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd. CVE-2016-3699 kernel: ACPI table override allowed when securelevel is enabled
References
  • (MISC) https://access.redhat.com/security/cve/CVE-2016-3699 -
  • (MISC) https://access.redhat.com/errata/RHSA-2016:2584 -
  • (MISC) https://access.redhat.com/errata/RHSA-2016:2574 -
CPE cpe:2.3:a:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*

Information

Published : 2016-10-07 14:59

Updated : 2023-12-10 11:46


NVD link : CVE-2016-3699

Mitre link : CVE-2016-3699

CVE.ORG link : CVE-2016-3699


JSON object : View

Products Affected

redhat

  • linux
  • enterprise_mrg

linux

  • linux_kernel
CWE
CWE-264

Permissions, Privileges, and Access Controls