Описание
The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.
Ссылки
- Third Party Advisory
- Broken Link
- Issue TrackingPatchThird Party AdvisoryVDB Entry
- Exploit
- Third Party Advisory
- Broken Link
- Issue TrackingPatchThird Party AdvisoryVDB Entry
- Exploit
Уязвимые конфигурации
Одно из
EPSS
7.4 High
CVSS3
6.9 Medium
CVSS2
Дефекты
Связанные уязвимости
The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.
The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.
The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat ...
The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.
ELSA-2016-3645: Unbreakable Enterprise kernel security update (IMPORTANT)
EPSS
7.4 High
CVSS3
6.9 Medium
CVSS2