Total vulnerabilities in the database
The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.
Software | From | Fixed in |
---|---|---|
redhat / linux | 7.2 | 7.2.x |
redhat / enterprise_mrg | 2.0 | 2.0.x |