High severity7.4NVD Advisory· Published Oct 7, 2016· Updated May 6, 2026
CVE-2016-3699
CVE-2016-3699
Description
The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- bugzilla.redhat.com/show_bug.cginvdIssue TrackingPatchThird Party AdvisoryVDB Entry
- github.com/mjg59/linux/commit/a4a5ed2835e8ea042868b7401dced3f517cafa76nvdExploit
- www.openwall.com/lists/oss-security/2016/09/22/4nvdThird Party Advisory
- www.securityfocus.com/bid/93114nvdBroken Link
- rhn.redhat.com/errata/RHSA-2016-2574.htmlnvd
- rhn.redhat.com/errata/RHSA-2016-2584.htmlnvd
News mentions
0No linked articles in our index yet.