Unspecified vulnerability in Shim might allow attackers to execute arbitrary code via a crafted MOK list, which triggers memory corruption.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Shim | Redhat | 0.3 (including) | 0.8 (excluding) |
Red Hat Enterprise Linux 7 | RedHat | shim-0:0.7-8.el7_0 | * |
Red Hat Enterprise Linux 7 | RedHat | shim-signed-0:0.7-8.el7_0 | * |
Shim | Ubuntu | devel | * |
Shim | Ubuntu | precise | * |
Shim | Ubuntu | trusty | * |
Shim | Ubuntu | utopic | * |
Shim | Ubuntu | vivid | * |