First published: Sat Mar 05 2016(Updated: )
A vulnerability was found in the RHEL7.2 kernel. When RHEL 7.2 is booted with UEFI Secure Boot enabled, securelevel is set. The kernel uses the state of securelevel to prevent userspace from inserting untrusted privileged code at runtime. The ACPI tables provided by firmware can be overwritten using the initrd. From the kernel documentation: If the ACPI_INITRD_TABLE_OVERRIDE compile option is true, it is possible to override nearly any ACPI table provided by the BIOS with an instrumented, modified one. RHEL 7.2 has CONFIG_ACPI_INITRD_TABLE_OVERRIDE kernel config option enabled, and will load ACPI tables appended to the initrd, even if booted with UEFI Secure Boot enabled and securelevel set. Upstream patch: <a href="https://github.com/mjg59/linux/commit/a4a5ed2835e8ea042868b7401dced3f517cafa76">https://github.com/mjg59/linux/commit/a4a5ed2835e8ea042868b7401dced3f517cafa76</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:3.10.0-514.rt56.420.el7 | 0:3.10.0-514.rt56.420.el7 |
redhat/kernel | <0:3.10.0-514.el7 | 0:3.10.0-514.el7 |
Linux Kernel | ||
Red Hat Enterprise MRG | =2.0 | |
Red Hat Linux | =7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3699 is rated as a high severity vulnerability due to its potential to allow untrusted code execution.
To fix CVE-2016-3699, you should update to the latest kernel version provided by Red Hat, such as kernel-rt 0:3.10.0-514.rt56.420.el7 or kernel 0:3.10.0-514.el7.
CVE-2016-3699 affects RHEL 7.2 and its specific kernel versions.
CVE-2016-3699 impacts the kernel's handling of UEFI Secure Boot and could allow unauthorized kernel modifications.
CVE-2016-3699 is not architecture-specific and affects the Linux kernel across supported platforms.