Unspecified vulnerability in Shim might allow attackers to execute arbitrary code via a crafted MOK list, which triggers memory corruption.
Affected Software
Name |
Vendor |
Start Version |
End Version |
Shim |
Redhat |
0.3 (including) |
0.8 (excluding) |
References