vulnerability
Red Hat: CVE-2016-3699: Important: kernel-rt security, bug fix, and enhancement update ((Multiple Advisories))
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:M/Au:N/C:C/I:C/A:C) | Oct 7, 2016 | Nov 4, 2016 | Jun 21, 2018 |
Severity
7
CVSS
(AV:L/AC:M/Au:N/C:C/I:C/A:C)
Published
Oct 7, 2016
Added
Nov 4, 2016
Modified
Jun 21, 2018
Description
The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.
Solutions
redhat-upgrade-kernelredhat-upgrade-kernel-abi-whitelistsredhat-upgrade-kernel-bootwrapperredhat-upgrade-kernel-debugredhat-upgrade-kernel-debug-debuginforedhat-upgrade-kernel-debug-develredhat-upgrade-kernel-debuginforedhat-upgrade-kernel-debuginfo-common-ppc64redhat-upgrade-kernel-debuginfo-common-s390xredhat-upgrade-kernel-debuginfo-common-x86_64redhat-upgrade-kernel-develredhat-upgrade-kernel-docredhat-upgrade-kernel-headersredhat-upgrade-kernel-kdumpredhat-upgrade-kernel-kdump-debuginforedhat-upgrade-kernel-kdump-develredhat-upgrade-kernel-rtredhat-upgrade-kernel-rt-debugredhat-upgrade-kernel-rt-debug-debuginforedhat-upgrade-kernel-rt-debug-develredhat-upgrade-kernel-rt-debuginforedhat-upgrade-kernel-rt-debuginfo-common-x86_64redhat-upgrade-kernel-rt-develredhat-upgrade-kernel-rt-docredhat-upgrade-kernel-rt-traceredhat-upgrade-kernel-rt-trace-debuginforedhat-upgrade-kernel-rt-trace-develredhat-upgrade-kernel-toolsredhat-upgrade-kernel-tools-debuginforedhat-upgrade-kernel-tools-libsredhat-upgrade-kernel-tools-libs-develredhat-upgrade-perfredhat-upgrade-perf-debuginforedhat-upgrade-python-perfredhat-upgrade-python-perf-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.