The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1329653 | issue tracking patch vdb entry third party advisory |
https://github.com/mjg59/linux/commit/a4a5ed2835e8ea042868b7401dced3f517cafa76 | exploit |
http://www.openwall.com/lists/oss-security/2016/09/22/4 | third party advisory mailing list |
http://rhn.redhat.com/errata/RHSA-2016-2584.html | vendor advisory |
http://rhn.redhat.com/errata/RHSA-2016-2574.html | vendor advisory |
http://www.securityfocus.com/bid/93114 | vdb entry broken link |