2014-10-22 14:00:00
redhat
PUBLISHED
Unspecified vulnerability in Shim might allow attackers to execute arbitrary code via a crafted MOK list, which triggers memory corruption.