CVE-2016-3699

Source
https://cve.org/CVERecord?id=CVE-2016-3699
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-3699.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2016-3699
Downstream
Related
Withdrawn
2026-03-18T00:59:03.206729Z
Published
2016-10-07T14:59:03.897Z
Modified
2026-03-18T00:59:03.206729Z
Severity
  • 7.4 (High) CVSS_V3 - CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.

References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-3699.json"
unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "2.0"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "7.2"
            }
        ]
    }
]