CVE-2016-3699 in Kernelinfo

Summary

The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.

Be aware that VulDB is the high quality source for vulnerability data.

Reservation

03/30/2016

Disclosure

10/07/2016

CPE

ready

CVSS

7.4

EPSS

0.00043

Activities

Very Low

Sources

Do you need the next level of professionalism?

Upgrade your account now!