Описание
The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | |
esm-infra-legacy/trusty | not-affected | |
esm-infra/xenial | not-affected | |
precise | not-affected | |
trusty | not-affected | |
trusty/esm | not-affected | |
upstream | not-affected | |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | not-affected | |
xenial | not-affected |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
precise | not-affected | |
trusty | DNE | |
trusty/esm | DNE | |
upstream | not-affected | |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | |
esm-apps/xenial | DNE | |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was ignored] |
precise | DNE | |
trusty | ignored | |
trusty/esm | DNE | trusty was ignored |
upstream | not-affected | |
vivid/stable-phone-overlay | not-affected | |
vivid/ubuntu-core | DNE | |
xenial | not-affected |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | |
esm-apps/xenial | DNE | |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was ignored] |
precise | DNE | |
trusty | ignored | |
trusty/esm | DNE | trusty was ignored |
upstream | not-affected | |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | not-affected |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was ignored] |
precise | DNE | |
trusty | ignored | |
trusty/esm | DNE | trusty was ignored |
upstream | not-affected | |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
precise | ignored | end of life |
trusty | DNE | |
trusty/esm | DNE | |
upstream | not-affected | |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
precise | ignored | end of life |
trusty | DNE | |
trusty/esm | DNE | |
upstream | not-affected | |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
precise | ignored | end of life |
trusty | DNE | |
trusty/esm | DNE | |
upstream | not-affected | |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
precise | ignored | end of life |
trusty | DNE | |
trusty/esm | DNE | |
upstream | not-affected | |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
precise | ignored | end of life |
trusty | DNE | |
trusty/esm | DNE | |
upstream | not-affected | |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
precise | ignored | end of life |
trusty | DNE | |
trusty/esm | DNE | |
upstream | not-affected | |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
precise | not-affected | |
trusty | DNE | |
trusty/esm | DNE | |
upstream | not-affected | |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was ignored [end of standard support]] |
precise | DNE | |
trusty | ignored | end of standard support |
trusty/esm | DNE | trusty was ignored [end of standard support] |
upstream | not-affected | |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected] |
precise | DNE | |
trusty | not-affected | |
trusty/esm | DNE | trusty was not-affected |
upstream | not-affected | |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was ignored [end of standard support]] |
precise | DNE | |
trusty | ignored | end of standard support |
trusty/esm | DNE | trusty was ignored [end of standard support] |
upstream | not-affected | |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | not-affected | |
precise | DNE | |
trusty | not-affected | |
trusty/esm | not-affected | |
upstream | not-affected | |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was ignored] |
precise | DNE | |
trusty | ignored | |
trusty/esm | DNE | trusty was ignored |
upstream | not-affected | |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | |
esm-apps/xenial | DNE | |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was ignored] |
precise | DNE | |
trusty | ignored | |
trusty/esm | DNE | trusty was ignored |
upstream | not-affected | |
vivid/stable-phone-overlay | not-affected | |
vivid/ubuntu-core | DNE | |
xenial | not-affected |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was ignored] |
precise | DNE | |
trusty | ignored | |
trusty/esm | DNE | trusty was ignored |
upstream | not-affected | |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
precise | ignored | end of life |
trusty | DNE | |
trusty/esm | DNE | |
upstream | not-affected | |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | |
esm-infra-legacy/trusty | DNE | |
precise | DNE | |
trusty | DNE | |
trusty/esm | DNE | |
upstream | not-affected | |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | not-affected | |
xenial | not-affected |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | |
esm-infra-legacy/trusty | DNE | |
precise | DNE | |
trusty | DNE | |
trusty/esm | DNE | |
upstream | not-affected | |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | not-affected |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
precise | not-affected | |
trusty | DNE | |
trusty/esm | DNE | |
upstream | not-affected | |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | DNE |
Показывать по
EPSS
6.9 Medium
CVSS2
7.4 High
CVSS3
Связанные уязвимости
The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.
The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.
The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat ...
The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.
ELSA-2016-3645: Unbreakable Enterprise kernel security update (IMPORTANT)
EPSS
6.9 Medium
CVSS2
7.4 High
CVSS3