The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T00:03:34.433Z
Reserved: 2016-03-30T00:00:00
Link: CVE-2016-3699

No data.

Status : Modified
Published: 2016-10-07T14:59:03.897
Modified: 2024-11-21T02:50:31.903
Link: CVE-2016-3699
