Количество 8
Количество 8

CVE-2016-3699
The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.

CVE-2016-3699
The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.

CVE-2016-3699
The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.
CVE-2016-3699
The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat ...
GHSA-pv5f-x9r7-h4c8
The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.
ELSA-2016-3645
ELSA-2016-3645: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2016-3644
ELSA-2016-3644: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2016-2574
ELSA-2016-2574: kernel security, bug fix, and enhancement update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2016-3699 The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd. | CVSS3: 7.4 | 0% Низкий | больше 8 лет назад |
![]() | CVE-2016-3699 The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd. | CVSS2: 3.3 | 0% Низкий | больше 9 лет назад |
![]() | CVE-2016-3699 The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd. | CVSS3: 7.4 | 0% Низкий | больше 8 лет назад |
CVE-2016-3699 The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat ... | CVSS3: 7.4 | 0% Низкий | больше 8 лет назад | |
GHSA-pv5f-x9r7-h4c8 The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd. | CVSS3: 7.4 | 0% Низкий | около 3 лет назад | |
ELSA-2016-3645 ELSA-2016-3645: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 8 лет назад | |||
ELSA-2016-3644 ELSA-2016-3644: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 8 лет назад | |||
ELSA-2016-2574 ELSA-2016-2574: kernel security, bug fix, and enhancement update (IMPORTANT) | больше 8 лет назад |
Уязвимостей на страницу