Unspecified vulnerability in Shim might allow attackers to execute arbitrary code via a crafted MOK list, which triggers memory corruption.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Shim | Redhat | 0.3 (including) | 0.8 (excluding) |
| Red Hat Enterprise Linux 7 | RedHat | shim-0:0.7-8.el7_0 | * |
| Red Hat Enterprise Linux 7 | RedHat | shim-signed-0:0.7-8.el7_0 | * |
| Shim | Ubuntu | devel | * |
| Shim | Ubuntu | esm-infra-legacy/trusty | * |
| Shim | Ubuntu | precise | * |
| Shim | Ubuntu | trusty | * |
| Shim | Ubuntu | trusty/esm | * |
| Shim | Ubuntu | utopic | * |
| Shim | Ubuntu | vivid | * |