Описание
Unspecified vulnerability in Shim might allow attackers to execute arbitrary code via a crafted MOK list, which triggers memory corruption.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 0.7-0ubuntu4 |
| esm-infra-legacy/trusty | released | 0.8-0ubuntu2 |
| lucid | DNE | |
| precise | released | 0.8-0ubuntu2 |
| trusty | released | 0.8-0ubuntu2 |
| trusty/esm | released | 0.8-0ubuntu2 |
| upstream | needs-triage | |
| utopic | released | 0.7-0ubuntu4 |
| vivid | released | 0.7-0ubuntu4 |
Показывать по
EPSS
7.5 High
CVSS2
Связанные уязвимости
Unspecified vulnerability in Shim might allow attackers to execute arbitrary code via a crafted MOK list, which triggers memory corruption.
Unspecified vulnerability in Shim might allow attackers to execute arbitrary code via a crafted MOK list, which triggers memory corruption.
Unspecified vulnerability in Shim might allow attackers to execute arbitrary code via a crafted MOK list, which triggers memory corruption.
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
EPSS
7.5 High
CVSS2