Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-3699

Опубликовано: 07 окт. 2016
Источник: debian
EPSS Низкий

Описание

The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxnot-affectedpackage

Примечания

  • https://github.com/mjg59/linux/commit/a4a5ed2835e8ea042868b7401dced3f517cafa76

  • securelevel patchset added in 4.5.1-1

EPSS

Процентиль: 11%
0.00038
Низкий

Связанные уязвимости

CVSS3: 7.4
ubuntu
около 9 лет назад

The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.

redhat
больше 9 лет назад

The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.

CVSS3: 7.4
nvd
около 9 лет назад

The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.

CVSS3: 7.4
github
больше 3 лет назад

The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.

oracle-oval
почти 9 лет назад

ELSA-2016-3645: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS

Процентиль: 11%
0.00038
Низкий