CVE-2016-3699 PUBLISHED

Reported by redhat · Published October 7, 2016

The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.

Affected Products

VendorProductVersions
n/an/an/a
chainguardlinux-qemu-melange0
chainguardlinux-aws-6.18*
chainguardlinux*
chainguardlinux-qemu-rc*
chainguardlinux-azure-6.18*
chainguardlinux-gcp-6.18*
chainguardlinux-qemu-generic*
chainguardlinux-azure-generic*
chainguardlinux-vmware-6.120
chainguardlinux-gcp-6.12*
n/an/an/a
chainguardlinux-vmware-generic*
chainguardlinux-qemu-6.180
chainguardlinux-aws-generic*
chainguardlinux-qemu-6.120
chainguardlinux-aws-6.12*
chainguardlinux-vmware-6.180
chainguardlinux-gcp-generic*
chainguardlinux-azure-6.12*

Timeline

References

Open in Interactive Console →