Vulnerabilities in Red Hat Enterprise Linux for Power