Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-40548
Vulnerability from cvelistv5
Published
2024-01-29 14:53
Modified
2024-11-24 14:19
Severity ?
EPSS score ?
Summary
A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Red Hat | Red Hat Enterprise Linux 7 |
Unaffected: 0:15.8-3.el7 < * cpe:/o:redhat:enterprise_linux:7::client cpe:/o:redhat:enterprise_linux:7::server cpe:/o:redhat:enterprise_linux:7::workstation |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:38:50.361Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2024:1834", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:1834" }, { "name": "RHSA-2024:1835", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:1835" }, { "name": "RHSA-2024:1873", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:1873" }, { "name": "RHSA-2024:1876", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:1876" }, { "name": "RHSA-2024:1883", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:1883" }, { "name": "RHSA-2024:1902", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:1902" }, { "name": "RHSA-2024:1903", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:1903" }, { "name": "RHSA-2024:1959", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:1959" }, { "name": "RHSA-2024:2086", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:2086" }, { "tags": [ "vdb-entry", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/security/cve/CVE-2023-40548" }, { "name": "RHBZ#2241782", "tags": [ "issue-tracking", "x_refsource_REDHAT", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ], "defaultStatus": "affected", "packageName": "shim", "product": "Red Hat Enterprise Linux 7", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-3.el7", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ], "defaultStatus": "affected", "packageName": "shim-signed", "product": "Red Hat Enterprise Linux 7", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-1.el7", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:8::baseos" ], "defaultStatus": "affected", "packageName": "shim", "product": "Red Hat Enterprise Linux 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-4.el8_9", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:rhel_tus:8.2::baseos", "cpe:/o:redhat:rhel_e4s:8.2::baseos", "cpe:/o:redhat:rhel_aus:8.2::baseos" ], "defaultStatus": "affected", "packageName": "shim", "product": "Red Hat Enterprise Linux 8.2 Advanced Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el8_2", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:rhel_tus:8.2::baseos", "cpe:/o:redhat:rhel_e4s:8.2::baseos", "cpe:/o:redhat:rhel_aus:8.2::baseos" ], "defaultStatus": "affected", "packageName": "shim", "product": "Red Hat Enterprise Linux 8.2 Telecommunications Update Service", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el8_2", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:rhel_tus:8.2::baseos", "cpe:/o:redhat:rhel_e4s:8.2::baseos", "cpe:/o:redhat:rhel_aus:8.2::baseos" ], "defaultStatus": "affected", "packageName": "shim", "product": "Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el8_2", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:rhel_tus:8.4::baseos", "cpe:/o:redhat:rhel_aus:8.4::baseos", "cpe:/o:redhat:rhel_e4s:8.4::baseos" ], "defaultStatus": "affected", "packageName": "shim", "product": "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el8_4", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:rhel_tus:8.4::baseos", "cpe:/o:redhat:rhel_aus:8.4::baseos", "cpe:/o:redhat:rhel_e4s:8.4::baseos" ], "defaultStatus": "affected", "packageName": "shim", "product": "Red Hat Enterprise Linux 8.4 Telecommunications Update Service", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el8_4", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:rhel_tus:8.4::baseos", "cpe:/o:redhat:rhel_aus:8.4::baseos", "cpe:/o:redhat:rhel_e4s:8.4::baseos" ], "defaultStatus": "affected", "packageName": "shim", "product": "Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el8_4", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:rhel_eus:8.6::baseos" ], "defaultStatus": "affected", "packageName": "shim", "product": "Red Hat Enterprise Linux 8.6 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el8_6", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_eus:8.8::crb", "cpe:/o:redhat:rhel_eus:8.8::baseos" ], "defaultStatus": "affected", "packageName": "shim", "product": "Red Hat Enterprise Linux 8.8 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el8", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_eus:8.8::crb", "cpe:/o:redhat:rhel_eus:8.8::baseos" ], "defaultStatus": "affected", "packageName": "shim-unsigned-x64", "product": "Red Hat Enterprise Linux 8.8 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el8", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:9::baseos" ], "defaultStatus": "affected", "packageName": "shim", "product": "Red Hat Enterprise Linux 9", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-4.el9_3", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/a:redhat:rhel_eus:9.0::crb", "cpe:/o:redhat:rhel_eus:9.0::baseos" ], "defaultStatus": "affected", "packageName": "shim", "product": "Red Hat Enterprise Linux 9.0 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-3.el9", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/a:redhat:rhel_eus:9.0::crb", "cpe:/o:redhat:rhel_eus:9.0::baseos" ], "defaultStatus": "affected", "packageName": "shim-unsigned-aarch64", "product": "Red Hat Enterprise Linux 9.0 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el9", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/a:redhat:rhel_eus:9.0::crb", "cpe:/o:redhat:rhel_eus:9.0::baseos" ], "defaultStatus": "affected", "packageName": "shim-unsigned-x64", "product": "Red Hat Enterprise Linux 9.0 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el9", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:rhel_eus:9.2::baseos" ], "defaultStatus": "affected", "packageName": "shim", "product": "Red Hat Enterprise Linux 9.2 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-3.el9_2", "versionType": "rpm" } ] } ], "datePublic": "2023-10-03T00:00:00+00:00", "descriptions": [ { "lang": "en", "value": "A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase." } ], "metrics": [ { "other": { "content": { "namespace": "https://access.redhat.com/security/updates/classification/", "value": "Moderate" }, "type": "Red Hat severity rating" } }, { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-24T14:19:01.409Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2024:1834", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:1834" }, { "name": "RHSA-2024:1835", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:1835" }, { "name": "RHSA-2024:1873", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:1873" }, { "name": "RHSA-2024:1876", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:1876" }, { "name": "RHSA-2024:1883", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:1883" }, { "name": "RHSA-2024:1902", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:1902" }, { "name": "RHSA-2024:1903", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:1903" }, { "name": "RHSA-2024:1959", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:1959" }, { "name": "RHSA-2024:2086", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:2086" }, { "tags": [ "vdb-entry", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/security/cve/CVE-2023-40548" }, { "name": "RHBZ#2241782", "tags": [ "issue-tracking", "x_refsource_REDHAT" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782" } ], "timeline": [ { "lang": "en", "time": "2023-10-02T00:00:00+00:00", "value": "Reported to Red Hat." }, { "lang": "en", "time": "2023-10-03T00:00:00+00:00", "value": "Made public." } ], "title": "Shim: interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems", "workarounds": [ { "lang": "en", "value": "There\u0027s no available mitigation for this issue." } ], "x_redhatCweChain": "(CWE-190|CWE-787): Integer Overflow or Wraparound or Out-of-bounds Write" } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2023-40548", "datePublished": "2024-01-29T14:53:44.319Z", "dateReserved": "2023-08-15T20:04:15.615Z", "dateUpdated": "2024-11-24T14:19:01.409Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-40548\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2024-01-29T15:15:08.893\",\"lastModified\":\"2024-11-21T08:19:41.833\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 un desbordamiento de b\u00fafer en Shim en el sistema de 32 bits. El desbordamiento ocurre debido a una operaci\u00f3n de suma que involucra un valor controlado por el usuario analizado del binario PE que utiliza Shim. Este valor se utiliza adem\u00e1s para operaciones de asignaci\u00f3n de memoria, lo que provoca un desbordamiento de b\u00fafer en la regi\u00f3n Heap de la memoria. Esta falla causa da\u00f1os en la memoria y puede provocar fallas o problemas de integridad de los datos durante la fase de inicio.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.4,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.4,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.4,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.4,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"},{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:shim:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.8\",\"matchCriteriaId\":\"01639865-3664-4034-BCFB-F4E09AF37F28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:shim:15.8:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF11AEF9-B742-46DC-94D2-6160B93767BD\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1834\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1835\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1873\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1876\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1883\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1902\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1903\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1959\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2086\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/security/cve/CVE-2023-40548\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2241782\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1834\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1835\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1873\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1876\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1883\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1902\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1903\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1959\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2086\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/security/cve/CVE-2023-40548\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2241782\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
rhsa-2024_1903
Vulnerability from csaf_redhat
Published
2024-04-18 17:42
Modified
2024-11-24 14:20
Summary
Red Hat Security Advisory: shim bug fix update
Notes
Topic
An update for shim is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The shim package contains a first-stage UEFI boot loader that handles chaining
to a trusted full boot loader under secure boot environments.
Security Fix(es):
* shim: RCE in http boot support may lead to Secure Boot bypass (CVE-2023-40547)
* shim: Interger overflow leads to heap buffer overflow in verify_sbat_section
on 32-bits systems (CVE-2023-40548)
* shim: Out-of-bounds read printing error messages (CVE-2023-40546)
* shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file
(CVE-2023-40549)
* shim: Out-of-bound read in verify_buffer_sbat() (CVE-2023-40550)
* shim: out of bounds read when parsing MZ binaries (CVE-2023-40551)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for shim is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The shim package contains a first-stage UEFI boot loader that handles chaining\nto a trusted full boot loader under secure boot environments.\n\nSecurity Fix(es):\n\n* shim: RCE in http boot support may lead to Secure Boot bypass (CVE-2023-40547)\n\n* shim: Interger overflow leads to heap buffer overflow in verify_sbat_section\non 32-bits systems (CVE-2023-40548)\n\n* shim: Out-of-bounds read printing error messages (CVE-2023-40546)\n\n* shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file\n(CVE-2023-40549)\n\n* shim: Out-of-bound read in verify_buffer_sbat() (CVE-2023-40550)\n\n* shim: out of bounds read when parsing MZ binaries (CVE-2023-40551)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:1903", "url": "https://access.redhat.com/errata/RHSA-2024:1903" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2234589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589" }, { "category": "external", "summary": "2241782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782" }, { "category": "external", "summary": "2241796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241796" }, { "category": "external", "summary": "2241797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241797" }, { "category": "external", "summary": "2259915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259915" }, { "category": "external", "summary": "2259918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259918" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1903.json" } ], "title": "Red Hat Security Advisory: shim bug fix update", "tracking": { "current_release_date": "2024-11-24T14:20:31+00:00", "generator": { "date": "2024-11-24T14:20:31+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:1903", "initial_release_date": "2024-04-18T17:42:35+00:00", "revision_history": [ { "date": "2024-04-18T17:42:35+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-04-18T17:42:35+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T14:20:31+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 9)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.3.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:9::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "shim-0:15.8-4.el9_3.src", "product": { "name": "shim-0:15.8-4.el9_3.src", "product_id": "shim-0:15.8-4.el9_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim@15.8-4.el9_3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "shim-aa64-0:15.8-4.el9_3.aarch64", "product": { "name": "shim-aa64-0:15.8-4.el9_3.aarch64", "product_id": "shim-aa64-0:15.8-4.el9_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-aa64@15.8-4.el9_3?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "shim-x64-0:15.8-4.el9_3.x86_64", "product": { "name": "shim-x64-0:15.8-4.el9_3.x86_64", "product_id": "shim-x64-0:15.8-4.el9_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-x64@15.8-4.el9_3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "shim-0:15.8-4.el9_3.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src" }, "product_reference": "shim-0:15.8-4.el9_3.src", "relates_to_product_reference": "BaseOS-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "shim-aa64-0:15.8-4.el9_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64" }, "product_reference": "shim-aa64-0:15.8-4.el9_3.aarch64", "relates_to_product_reference": "BaseOS-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "shim-x64-0:15.8-4.el9_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" }, "product_reference": "shim-x64-0:15.8-4.el9_3.x86_64", "relates_to_product_reference": "BaseOS-9.3.0.Z.MAIN" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-40546", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241796" } ], "notes": [ { "category": "description", "text": "A flaw was found in Shim when an error happened while creating a new ESL variable. If Shim fails to create the new variable, it tries to print an error message to the user; however, the number of parameters used by the logging function doesn\u0027t match the format string used by it, leading to a crash under certain circumstances.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bounds read printing error messages", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40546" }, { "category": "external", "summary": "RHBZ#2241796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241796" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40546", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40546" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40546", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40546" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T17:42:35+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1903" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bounds read printing error messages" }, { "acknowledgments": [ { "names": [ "Bill Demirkapi" ], "organization": "Microsoft Security Response Center" } ], "cve": "CVE-2023-40547", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-05-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2234589" } ], "notes": [ { "category": "description", "text": "A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: RCE in http boot support may lead to Secure Boot bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is only exploitable when the machine is booting UEFI through the network. During startup, before loading a local boot image, Shim checks whether the system is configured to support network booting. If the check succeeds, Shim attempts to load the bootable image from the boot\u0027s previously configured server using the HTTP protocol, which exposes the system to the vulnerability described by this CVE.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40547" }, { "category": "external", "summary": "RHBZ#2234589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40547", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40547" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T17:42:35+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1903" }, { "category": "workaround", "details": "If a system isn\u2019t required to boot from the network, configure the server\u2019s boot order to disable entirely or skip the network boot.", "product_ids": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "shim: RCE in http boot support may lead to Secure Boot bypass" }, { "cve": "CVE-2023-40548", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241782" } ], "notes": [ { "category": "description", "text": "A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40548" }, { "category": "external", "summary": "RHBZ#2241782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40548", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40548" } ], "release_date": "2023-10-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T17:42:35+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1903" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems" }, { "cve": "CVE-2023-40549", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241797" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in Shim due to the lack of proper boundary verification during the load of a PE binary. This flaw allows an attacker to load a crafted PE binary, triggering the issue and crashing Shim, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40549" }, { "category": "external", "summary": "RHBZ#2241797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241797" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40549", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40549" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T17:42:35+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1903" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file" }, { "cve": "CVE-2023-40550", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-01-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259915" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in Shim when it tried to validate the SBAT information. This issue may expose sensitive data during the system\u0027s boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bound read in verify_buffer_sbat()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40550" }, { "category": "external", "summary": "RHBZ#2259915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259915" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40550", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40550" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40550", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40550" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T17:42:35+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1903" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bound read in verify_buffer_sbat()" }, { "cve": "CVE-2023-40551", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-07-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259918" } ], "notes": [ { "category": "description", "text": "A flaw was found in the MZ binary format in Shim. An out-of-bounds read may occur, leading to a crash or possible exposure of sensitive data during the system\u0027s boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: out of bounds read when parsing MZ binaries", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40551" }, { "category": "external", "summary": "RHBZ#2259918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259918" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40551", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40551" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40551", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40551" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T17:42:35+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1903" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-9.3.0.Z.MAIN:shim-0:15.8-4.el9_3.src", "BaseOS-9.3.0.Z.MAIN:shim-aa64-0:15.8-4.el9_3.aarch64", "BaseOS-9.3.0.Z.MAIN:shim-x64-0:15.8-4.el9_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: out of bounds read when parsing MZ binaries" } ] }
rhsa-2024_2086
Vulnerability from csaf_redhat
Published
2024-04-29 12:31
Modified
2024-11-24 14:20
Summary
Red Hat Security Advisory: shim security update
Notes
Topic
An update for shim is now available for Red Hat Enterprise Linux 8.6 Extended
Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The shim package contains a first-stage UEFI boot loader that handles chaining
to a trusted full boot loader under secure boot environments.
Security Fix(es):
* shim: RCE in http boot support may lead to Secure Boot bypass (CVE-2023-40547)
* shim: Interger overflow leads to heap buffer overflow in verify_sbat_section
on 32-bits systems (CVE-2023-40548)
* shim: Out-of-bounds read printing error messages (CVE-2023-40546)
* shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file
(CVE-2023-40549)
* shim: Out-of-bound read in verify_buffer_sbat() (CVE-2023-40550)
* shim: out of bounds read when parsing MZ binaries (CVE-2023-40551)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for shim is now available for Red Hat Enterprise Linux 8.6 Extended\nUpdate Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The shim package contains a first-stage UEFI boot loader that handles chaining\nto a trusted full boot loader under secure boot environments.\n\nSecurity Fix(es):\n\n* shim: RCE in http boot support may lead to Secure Boot bypass (CVE-2023-40547)\n\n* shim: Interger overflow leads to heap buffer overflow in verify_sbat_section\non 32-bits systems (CVE-2023-40548)\n\n* shim: Out-of-bounds read printing error messages (CVE-2023-40546)\n\n* shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file\n(CVE-2023-40549)\n\n* shim: Out-of-bound read in verify_buffer_sbat() (CVE-2023-40550)\n\n* shim: out of bounds read when parsing MZ binaries (CVE-2023-40551)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:2086", "url": "https://access.redhat.com/errata/RHSA-2024:2086" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2234589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589" }, { "category": "external", "summary": "2241782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782" }, { "category": "external", "summary": "2241796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241796" }, { "category": "external", "summary": "2241797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241797" }, { "category": "external", "summary": "2259915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259915" }, { "category": "external", "summary": "2259918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259918" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2086.json" } ], "title": "Red Hat Security Advisory: shim security update", "tracking": { "current_release_date": "2024-11-24T14:20:50+00:00", "generator": { "date": "2024-11-24T14:20:50+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:2086", "initial_release_date": "2024-04-29T12:31:44+00:00", "revision_history": [ { "date": "2024-04-29T12:31:44+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-04-29T12:31:44+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T14:20:50+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS EUS (v.8.6)", "product": { "name": "Red Hat Enterprise Linux BaseOS EUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:8.6::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "shim-0:15.8-2.el8_6.src", "product": { "name": "shim-0:15.8-2.el8_6.src", "product_id": "shim-0:15.8-2.el8_6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim@15.8-2.el8_6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "shim-aa64-0:15.8-2.el8_6.aarch64", "product": { "name": "shim-aa64-0:15.8-2.el8_6.aarch64", "product_id": "shim-aa64-0:15.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-aa64@15.8-2.el8_6?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "shim-ia32-0:15.8-2.el8_6.x86_64", "product": { "name": "shim-ia32-0:15.8-2.el8_6.x86_64", "product_id": "shim-ia32-0:15.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-ia32@15.8-2.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "shim-x64-0:15.8-2.el8_6.x86_64", "product": { "name": "shim-x64-0:15.8-2.el8_6.x86_64", "product_id": "shim-x64-0:15.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-x64@15.8-2.el8_6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "shim-0:15.8-2.el8_6.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src" }, "product_reference": "shim-0:15.8-2.el8_6.src", "relates_to_product_reference": "BaseOS-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-aa64-0:15.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64" }, "product_reference": "shim-aa64-0:15.8-2.el8_6.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-ia32-0:15.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64" }, "product_reference": "shim-ia32-0:15.8-2.el8_6.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-x64-0:15.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" }, "product_reference": "shim-x64-0:15.8-2.el8_6.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-40546", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241796" } ], "notes": [ { "category": "description", "text": "A flaw was found in Shim when an error happened while creating a new ESL variable. If Shim fails to create the new variable, it tries to print an error message to the user; however, the number of parameters used by the logging function doesn\u0027t match the format string used by it, leading to a crash under certain circumstances.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bounds read printing error messages", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40546" }, { "category": "external", "summary": "RHBZ#2241796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241796" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40546", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40546" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40546", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40546" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-29T12:31:44+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2086" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bounds read printing error messages" }, { "acknowledgments": [ { "names": [ "Bill Demirkapi" ], "organization": "Microsoft Security Response Center" } ], "cve": "CVE-2023-40547", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-05-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2234589" } ], "notes": [ { "category": "description", "text": "A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: RCE in http boot support may lead to Secure Boot bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is only exploitable when the machine is booting UEFI through the network. During startup, before loading a local boot image, Shim checks whether the system is configured to support network booting. If the check succeeds, Shim attempts to load the bootable image from the boot\u0027s previously configured server using the HTTP protocol, which exposes the system to the vulnerability described by this CVE.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40547" }, { "category": "external", "summary": "RHBZ#2234589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40547", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40547" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-29T12:31:44+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2086" }, { "category": "workaround", "details": "If a system isn\u2019t required to boot from the network, configure the server\u2019s boot order to disable entirely or skip the network boot.", "product_ids": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "shim: RCE in http boot support may lead to Secure Boot bypass" }, { "cve": "CVE-2023-40548", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241782" } ], "notes": [ { "category": "description", "text": "A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40548" }, { "category": "external", "summary": "RHBZ#2241782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40548", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40548" } ], "release_date": "2023-10-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-29T12:31:44+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2086" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems" }, { "cve": "CVE-2023-40549", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241797" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in Shim due to the lack of proper boundary verification during the load of a PE binary. This flaw allows an attacker to load a crafted PE binary, triggering the issue and crashing Shim, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40549" }, { "category": "external", "summary": "RHBZ#2241797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241797" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40549", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40549" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-29T12:31:44+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2086" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file" }, { "cve": "CVE-2023-40550", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-01-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259915" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in Shim when it tried to validate the SBAT information. This issue may expose sensitive data during the system\u0027s boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bound read in verify_buffer_sbat()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40550" }, { "category": "external", "summary": "RHBZ#2259915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259915" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40550", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40550" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40550", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40550" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-29T12:31:44+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2086" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bound read in verify_buffer_sbat()" }, { "cve": "CVE-2023-40551", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-07-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259918" } ], "notes": [ { "category": "description", "text": "A flaw was found in the MZ binary format in Shim. An out-of-bounds read may occur, leading to a crash or possible exposure of sensitive data during the system\u0027s boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: out of bounds read when parsing MZ binaries", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40551" }, { "category": "external", "summary": "RHBZ#2259918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259918" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40551", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40551" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40551", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40551" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-29T12:31:44+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2086" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.Z.EUS:shim-0:15.8-2.el8_6.src", "BaseOS-8.6.0.Z.EUS:shim-aa64-0:15.8-2.el8_6.aarch64", "BaseOS-8.6.0.Z.EUS:shim-ia32-0:15.8-2.el8_6.x86_64", "BaseOS-8.6.0.Z.EUS:shim-x64-0:15.8-2.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: out of bounds read when parsing MZ binaries" } ] }
rhsa-2024_1883
Vulnerability from csaf_redhat
Published
2024-04-18 01:56
Modified
2024-11-24 14:19
Summary
Red Hat Security Advisory: shim security update
Notes
Topic
An update for shim is now available for Red Hat Enterprise Linux 8.8 Extended
Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The shim package contains a first-stage UEFI boot loader that handles chaining
to a trusted full boot loader under secure boot environments.
Security Fix(es):
* shim: RCE in http boot support may lead to Secure Boot bypass (CVE-2023-40547)
* shim: Interger overflow leads to heap buffer overflow in verify_sbat_section
on 32-bits systems (CVE-2023-40548)
* shim: Out-of-bounds read printing error messages (CVE-2023-40546)
* shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file
(CVE-2023-40549)
* shim: Out-of-bound read in verify_buffer_sbat() (CVE-2023-40550)
* shim: out of bounds read when parsing MZ binaries (CVE-2023-40551)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for shim is now available for Red Hat Enterprise Linux 8.8 Extended\nUpdate Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The shim package contains a first-stage UEFI boot loader that handles chaining\nto a trusted full boot loader under secure boot environments.\n\nSecurity Fix(es):\n\n* shim: RCE in http boot support may lead to Secure Boot bypass (CVE-2023-40547)\n\n* shim: Interger overflow leads to heap buffer overflow in verify_sbat_section\non 32-bits systems (CVE-2023-40548)\n\n* shim: Out-of-bounds read printing error messages (CVE-2023-40546)\n\n* shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file\n(CVE-2023-40549)\n\n* shim: Out-of-bound read in verify_buffer_sbat() (CVE-2023-40550)\n\n* shim: out of bounds read when parsing MZ binaries (CVE-2023-40551)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:1883", "url": "https://access.redhat.com/errata/RHSA-2024:1883" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2234589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589" }, { "category": "external", "summary": "2241782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782" }, { "category": "external", "summary": "2241796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241796" }, { "category": "external", "summary": "2241797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241797" }, { "category": "external", "summary": "2259915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259915" }, { "category": "external", "summary": "2259918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259918" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1883.json" } ], "title": "Red Hat Security Advisory: shim security update", "tracking": { "current_release_date": "2024-11-24T14:19:51+00:00", "generator": { "date": "2024-11-24T14:19:51+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:1883", "initial_release_date": "2024-04-18T01:56:22+00:00", "revision_history": [ { "date": "2024-04-18T01:56:22+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-04-18T01:56:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T14:19:51+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat CodeReady Linux Builder EUS (v.8.8)", "product": { "name": "Red Hat CodeReady Linux Builder EUS (v.8.8)", "product_id": "CRB-8.8.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.8::crb" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product": { "name": "Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:8.8::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "shim-unsigned-x64-0:15.8-2.el8.src", "product": { "name": "shim-unsigned-x64-0:15.8-2.el8.src", "product_id": "shim-unsigned-x64-0:15.8-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-unsigned-x64@15.8-2.el8?arch=src" } } }, { "category": "product_version", "name": "shim-0:15.8-2.el8.src", "product": { "name": "shim-0:15.8-2.el8.src", "product_id": "shim-0:15.8-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim@15.8-2.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "shim-unsigned-x64-0:15.8-2.el8.x86_64", "product": { "name": "shim-unsigned-x64-0:15.8-2.el8.x86_64", "product_id": "shim-unsigned-x64-0:15.8-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-unsigned-x64@15.8-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "shim-ia32-0:15.8-2.el8.x86_64", "product": { "name": "shim-ia32-0:15.8-2.el8.x86_64", "product_id": "shim-ia32-0:15.8-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-ia32@15.8-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "shim-x64-0:15.8-2.el8.x86_64", "product": { "name": "shim-x64-0:15.8-2.el8.x86_64", "product_id": "shim-x64-0:15.8-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-x64@15.8-2.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "shim-aa64-0:15.8-2.el8.aarch64", "product": { "name": "shim-aa64-0:15.8-2.el8.aarch64", "product_id": "shim-aa64-0:15.8-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-aa64@15.8-2.el8?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "shim-0:15.8-2.el8.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src" }, "product_reference": "shim-0:15.8-2.el8.src", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-aa64-0:15.8-2.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64" }, "product_reference": "shim-aa64-0:15.8-2.el8.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-ia32-0:15.8-2.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64" }, "product_reference": "shim-ia32-0:15.8-2.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-x64-0:15.8-2.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64" }, "product_reference": "shim-x64-0:15.8-2.el8.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-unsigned-x64-0:15.8-2.el8.src as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)", "product_id": "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src" }, "product_reference": "shim-unsigned-x64-0:15.8-2.el8.src", "relates_to_product_reference": "CRB-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-unsigned-x64-0:15.8-2.el8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)", "product_id": "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" }, "product_reference": "shim-unsigned-x64-0:15.8-2.el8.x86_64", "relates_to_product_reference": "CRB-8.8.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-40546", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241796" } ], "notes": [ { "category": "description", "text": "A flaw was found in Shim when an error happened while creating a new ESL variable. If Shim fails to create the new variable, it tries to print an error message to the user; however, the number of parameters used by the logging function doesn\u0027t match the format string used by it, leading to a crash under certain circumstances.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bounds read printing error messages", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40546" }, { "category": "external", "summary": "RHBZ#2241796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241796" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40546", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40546" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40546", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40546" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T01:56:22+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1883" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bounds read printing error messages" }, { "acknowledgments": [ { "names": [ "Bill Demirkapi" ], "organization": "Microsoft Security Response Center" } ], "cve": "CVE-2023-40547", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-05-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2234589" } ], "notes": [ { "category": "description", "text": "A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: RCE in http boot support may lead to Secure Boot bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is only exploitable when the machine is booting UEFI through the network. During startup, before loading a local boot image, Shim checks whether the system is configured to support network booting. If the check succeeds, Shim attempts to load the bootable image from the boot\u0027s previously configured server using the HTTP protocol, which exposes the system to the vulnerability described by this CVE.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40547" }, { "category": "external", "summary": "RHBZ#2234589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40547", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40547" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T01:56:22+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1883" }, { "category": "workaround", "details": "If a system isn\u2019t required to boot from the network, configure the server\u2019s boot order to disable entirely or skip the network boot.", "product_ids": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "shim: RCE in http boot support may lead to Secure Boot bypass" }, { "cve": "CVE-2023-40548", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241782" } ], "notes": [ { "category": "description", "text": "A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40548" }, { "category": "external", "summary": "RHBZ#2241782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40548", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40548" } ], "release_date": "2023-10-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T01:56:22+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1883" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems" }, { "cve": "CVE-2023-40549", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241797" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in Shim due to the lack of proper boundary verification during the load of a PE binary. This flaw allows an attacker to load a crafted PE binary, triggering the issue and crashing Shim, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40549" }, { "category": "external", "summary": "RHBZ#2241797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241797" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40549", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40549" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T01:56:22+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1883" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file" }, { "cve": "CVE-2023-40550", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-01-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259915" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in Shim when it tried to validate the SBAT information. This issue may expose sensitive data during the system\u0027s boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bound read in verify_buffer_sbat()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40550" }, { "category": "external", "summary": "RHBZ#2259915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259915" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40550", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40550" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40550", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40550" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T01:56:22+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1883" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bound read in verify_buffer_sbat()" }, { "cve": "CVE-2023-40551", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-07-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259918" } ], "notes": [ { "category": "description", "text": "A flaw was found in the MZ binary format in Shim. An out-of-bounds read may occur, leading to a crash or possible exposure of sensitive data during the system\u0027s boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: out of bounds read when parsing MZ binaries", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40551" }, { "category": "external", "summary": "RHBZ#2259918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259918" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40551", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40551" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40551", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40551" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T01:56:22+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1883" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.8.0.Z.EUS:shim-0:15.8-2.el8.src", "BaseOS-8.8.0.Z.EUS:shim-aa64-0:15.8-2.el8.aarch64", "BaseOS-8.8.0.Z.EUS:shim-ia32-0:15.8-2.el8.x86_64", "BaseOS-8.8.0.Z.EUS:shim-x64-0:15.8-2.el8.x86_64", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.src", "CRB-8.8.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: out of bounds read when parsing MZ binaries" } ] }
rhsa-2024_1873
Vulnerability from csaf_redhat
Published
2024-04-18 01:42
Modified
2024-11-24 14:20
Summary
Red Hat Security Advisory: shim security update
Notes
Topic
An update for shim is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, E4S Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.4 Telecommunications Update Service.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The shim package contains a first-stage UEFI boot loader that handles chaining
to a trusted full boot loader under secure boot environments.
Security Fix(es):
* shim: RCE in http boot support may lead to Secure Boot bypass (CVE-2023-40547)
* shim: Interger overflow leads to heap buffer overflow in verify_sbat_section
on 32-bits systems (CVE-2023-40548)
* shim: Out-of-bounds read printing error messages (CVE-2023-40546)
* shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file
(CVE-2023-40549)
* shim: Out-of-bound read in verify_buffer_sbat() (CVE-2023-40550)
* shim: out of bounds read when parsing MZ binaries (CVE-2023-40551)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for shim is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, E4S Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.4 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The shim package contains a first-stage UEFI boot loader that handles chaining\nto a trusted full boot loader under secure boot environments.\n\nSecurity Fix(es):\n\n* shim: RCE in http boot support may lead to Secure Boot bypass (CVE-2023-40547)\n\n* shim: Interger overflow leads to heap buffer overflow in verify_sbat_section\non 32-bits systems (CVE-2023-40548)\n\n* shim: Out-of-bounds read printing error messages (CVE-2023-40546)\n\n* shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file\n(CVE-2023-40549)\n\n* shim: Out-of-bound read in verify_buffer_sbat() (CVE-2023-40550)\n\n* shim: out of bounds read when parsing MZ binaries (CVE-2023-40551)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:1873", "url": "https://access.redhat.com/errata/RHSA-2024:1873" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2234589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589" }, { "category": "external", "summary": "2241782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782" }, { "category": "external", "summary": "2241796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241796" }, { "category": "external", "summary": "2241797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241797" }, { "category": "external", "summary": "2259915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259915" }, { "category": "external", "summary": "2259918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259918" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1873.json" } ], "title": "Red Hat Security Advisory: shim security update", "tracking": { "current_release_date": "2024-11-24T14:20:11+00:00", "generator": { "date": "2024-11-24T14:20:11+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:1873", "initial_release_date": "2024-04-18T01:42:32+00:00", "revision_history": [ { "date": "2024-04-18T01:42:32+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-04-18T01:42:32+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T14:20:11+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:8.4::baseos" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product": { "name": "Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:8.4::baseos" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:8.4::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "shim-0:15.8-2.el8_4.src", "product": { "name": "shim-0:15.8-2.el8_4.src", "product_id": "shim-0:15.8-2.el8_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim@15.8-2.el8_4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "shim-ia32-0:15.8-2.el8_4.x86_64", "product": { "name": "shim-ia32-0:15.8-2.el8_4.x86_64", "product_id": "shim-ia32-0:15.8-2.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-ia32@15.8-2.el8_4?arch=x86_64" } } }, { "category": "product_version", "name": "shim-x64-0:15.8-2.el8_4.x86_64", "product": { "name": "shim-x64-0:15.8-2.el8_4.x86_64", "product_id": "shim-x64-0:15.8-2.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-x64@15.8-2.el8_4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "shim-0:15.8-2.el8_4.src as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src" }, "product_reference": "shim-0:15.8-2.el8_4.src", "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-ia32-0:15.8-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64" }, "product_reference": "shim-ia32-0:15.8-2.el8_4.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-x64-0:15.8-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64" }, "product_reference": "shim-x64-0:15.8-2.el8_4.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-0:15.8-2.el8_4.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src" }, "product_reference": "shim-0:15.8-2.el8_4.src", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "shim-ia32-0:15.8-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64" }, "product_reference": "shim-ia32-0:15.8-2.el8_4.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "shim-x64-0:15.8-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64" }, "product_reference": "shim-x64-0:15.8-2.el8_4.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "shim-0:15.8-2.el8_4.src as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src" }, "product_reference": "shim-0:15.8-2.el8_4.src", "relates_to_product_reference": "BaseOS-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-ia32-0:15.8-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64" }, "product_reference": "shim-ia32-0:15.8-2.el8_4.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-x64-0:15.8-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" }, "product_reference": "shim-x64-0:15.8-2.el8_4.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.TUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-40546", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241796" } ], "notes": [ { "category": "description", "text": "A flaw was found in Shim when an error happened while creating a new ESL variable. If Shim fails to create the new variable, it tries to print an error message to the user; however, the number of parameters used by the logging function doesn\u0027t match the format string used by it, leading to a crash under certain circumstances.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bounds read printing error messages", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40546" }, { "category": "external", "summary": "RHBZ#2241796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241796" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40546", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40546" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40546", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40546" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T01:42:32+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1873" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bounds read printing error messages" }, { "acknowledgments": [ { "names": [ "Bill Demirkapi" ], "organization": "Microsoft Security Response Center" } ], "cve": "CVE-2023-40547", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-05-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2234589" } ], "notes": [ { "category": "description", "text": "A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: RCE in http boot support may lead to Secure Boot bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is only exploitable when the machine is booting UEFI through the network. During startup, before loading a local boot image, Shim checks whether the system is configured to support network booting. If the check succeeds, Shim attempts to load the bootable image from the boot\u0027s previously configured server using the HTTP protocol, which exposes the system to the vulnerability described by this CVE.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40547" }, { "category": "external", "summary": "RHBZ#2234589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40547", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40547" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T01:42:32+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1873" }, { "category": "workaround", "details": "If a system isn\u2019t required to boot from the network, configure the server\u2019s boot order to disable entirely or skip the network boot.", "product_ids": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "shim: RCE in http boot support may lead to Secure Boot bypass" }, { "cve": "CVE-2023-40548", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241782" } ], "notes": [ { "category": "description", "text": "A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40548" }, { "category": "external", "summary": "RHBZ#2241782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40548", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40548" } ], "release_date": "2023-10-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T01:42:32+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1873" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems" }, { "cve": "CVE-2023-40549", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241797" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in Shim due to the lack of proper boundary verification during the load of a PE binary. This flaw allows an attacker to load a crafted PE binary, triggering the issue and crashing Shim, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40549" }, { "category": "external", "summary": "RHBZ#2241797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241797" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40549", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40549" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T01:42:32+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1873" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file" }, { "cve": "CVE-2023-40550", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-01-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259915" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in Shim when it tried to validate the SBAT information. This issue may expose sensitive data during the system\u0027s boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bound read in verify_buffer_sbat()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40550" }, { "category": "external", "summary": "RHBZ#2259915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259915" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40550", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40550" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40550", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40550" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T01:42:32+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1873" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bound read in verify_buffer_sbat()" }, { "cve": "CVE-2023-40551", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-07-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259918" } ], "notes": [ { "category": "description", "text": "A flaw was found in the MZ binary format in Shim. An out-of-bounds read may occur, leading to a crash or possible exposure of sensitive data during the system\u0027s boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: out of bounds read when parsing MZ binaries", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40551" }, { "category": "external", "summary": "RHBZ#2259918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259918" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40551", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40551" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40551", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40551" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T01:42:32+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1873" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.Z.AUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.AUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.AUS:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.E4S:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.E4S:shim-x64-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-0:15.8-2.el8_4.src", "BaseOS-8.4.0.Z.TUS:shim-ia32-0:15.8-2.el8_4.x86_64", "BaseOS-8.4.0.Z.TUS:shim-x64-0:15.8-2.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: out of bounds read when parsing MZ binaries" } ] }
rhsa-2024_1834
Vulnerability from csaf_redhat
Published
2024-04-16 13:38
Modified
2024-11-24 14:19
Summary
Red Hat Security Advisory: shim security update
Notes
Topic
An update for shim is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.2 Telecommunications Update Service.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The shim package contains a first-stage UEFI boot loader that handles chaining to a trusted full boot loader under secure boot environments.
Security Fix(es):
* shim: RCE in http boot support may lead to Secure Boot bypass (CVE-2023-40547)
* shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems (CVE-2023-40548)
* shim: Out-of-bounds read printing error messages (CVE-2023-40546)
* shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file (CVE-2023-40549)
* shim: Out-of-bound read in verify_buffer_sbat() (CVE-2023-40550)
* shim: out of bounds read when parsing MZ binaries (CVE-2023-40551)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for shim is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.2 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The shim package contains a first-stage UEFI boot loader that handles chaining to a trusted full boot loader under secure boot environments.\n\nSecurity Fix(es):\n\n* shim: RCE in http boot support may lead to Secure Boot bypass (CVE-2023-40547)\n\n* shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems (CVE-2023-40548)\n\n* shim: Out-of-bounds read printing error messages (CVE-2023-40546)\n\n* shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file (CVE-2023-40549)\n\n* shim: Out-of-bound read in verify_buffer_sbat() (CVE-2023-40550)\n\n* shim: out of bounds read when parsing MZ binaries (CVE-2023-40551)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:1834", "url": "https://access.redhat.com/errata/RHSA-2024:1834" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2234589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589" }, { "category": "external", "summary": "2241782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782" }, { "category": "external", "summary": "2241796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241796" }, { "category": "external", "summary": "2241797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241797" }, { "category": "external", "summary": "2259915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259915" }, { "category": "external", "summary": "2259918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259918" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1834.json" } ], "title": "Red Hat Security Advisory: shim security update", "tracking": { "current_release_date": "2024-11-24T14:19:40+00:00", "generator": { "date": "2024-11-24T14:19:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:1834", "initial_release_date": "2024-04-16T13:38:02+00:00", "revision_history": [ { "date": "2024-04-16T13:38:02+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-04-16T13:38:02+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T14:19:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:8.2::baseos" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:8.2::baseos" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:8.2::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "shim-0:15.8-2.el8_2.src", "product": { "name": "shim-0:15.8-2.el8_2.src", "product_id": "shim-0:15.8-2.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim@15.8-2.el8_2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "shim-ia32-0:15.8-2.el8_2.x86_64", "product": { "name": "shim-ia32-0:15.8-2.el8_2.x86_64", "product_id": "shim-ia32-0:15.8-2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-ia32@15.8-2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "shim-x64-0:15.8-2.el8_2.x86_64", "product": { "name": "shim-x64-0:15.8-2.el8_2.x86_64", "product_id": "shim-x64-0:15.8-2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-x64@15.8-2.el8_2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "shim-0:15.8-2.el8_2.src as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src" }, "product_reference": "shim-0:15.8-2.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-ia32-0:15.8-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64" }, "product_reference": "shim-ia32-0:15.8-2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-x64-0:15.8-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64" }, "product_reference": "shim-x64-0:15.8-2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-0:15.8-2.el8_2.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src" }, "product_reference": "shim-0:15.8-2.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "shim-ia32-0:15.8-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64" }, "product_reference": "shim-ia32-0:15.8-2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "shim-x64-0:15.8-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64" }, "product_reference": "shim-x64-0:15.8-2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "shim-0:15.8-2.el8_2.src as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src" }, "product_reference": "shim-0:15.8-2.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-ia32-0:15.8-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64" }, "product_reference": "shim-ia32-0:15.8-2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-x64-0:15.8-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" }, "product_reference": "shim-x64-0:15.8-2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-40546", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241796" } ], "notes": [ { "category": "description", "text": "A flaw was found in Shim when an error happened while creating a new ESL variable. If Shim fails to create the new variable, it tries to print an error message to the user; however, the number of parameters used by the logging function doesn\u0027t match the format string used by it, leading to a crash under certain circumstances.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bounds read printing error messages", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40546" }, { "category": "external", "summary": "RHBZ#2241796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241796" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40546", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40546" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40546", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40546" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-16T13:38:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1834" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bounds read printing error messages" }, { "acknowledgments": [ { "names": [ "Bill Demirkapi" ], "organization": "Microsoft Security Response Center" } ], "cve": "CVE-2023-40547", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-05-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2234589" } ], "notes": [ { "category": "description", "text": "A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: RCE in http boot support may lead to Secure Boot bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is only exploitable when the machine is booting UEFI through the network. During startup, before loading a local boot image, Shim checks whether the system is configured to support network booting. If the check succeeds, Shim attempts to load the bootable image from the boot\u0027s previously configured server using the HTTP protocol, which exposes the system to the vulnerability described by this CVE.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40547" }, { "category": "external", "summary": "RHBZ#2234589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40547", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40547" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-16T13:38:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1834" }, { "category": "workaround", "details": "If a system isn\u2019t required to boot from the network, configure the server\u2019s boot order to disable entirely or skip the network boot.", "product_ids": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "shim: RCE in http boot support may lead to Secure Boot bypass" }, { "cve": "CVE-2023-40548", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241782" } ], "notes": [ { "category": "description", "text": "A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40548" }, { "category": "external", "summary": "RHBZ#2241782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40548", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40548" } ], "release_date": "2023-10-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-16T13:38:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1834" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems" }, { "cve": "CVE-2023-40549", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241797" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in Shim due to the lack of proper boundary verification during the load of a PE binary. This flaw allows an attacker to load a crafted PE binary, triggering the issue and crashing Shim, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40549" }, { "category": "external", "summary": "RHBZ#2241797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241797" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40549", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40549" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-16T13:38:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1834" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file" }, { "cve": "CVE-2023-40550", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-01-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259915" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in Shim when it tried to validate the SBAT information. This issue may expose sensitive data during the system\u0027s boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bound read in verify_buffer_sbat()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40550" }, { "category": "external", "summary": "RHBZ#2259915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259915" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40550", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40550" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40550", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40550" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-16T13:38:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1834" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bound read in verify_buffer_sbat()" }, { "cve": "CVE-2023-40551", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-07-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259918" } ], "notes": [ { "category": "description", "text": "A flaw was found in the MZ binary format in Shim. An out-of-bounds read may occur, leading to a crash or possible exposure of sensitive data during the system\u0027s boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: out of bounds read when parsing MZ binaries", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40551" }, { "category": "external", "summary": "RHBZ#2259918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259918" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40551", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40551" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40551", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40551" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-16T13:38:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1834" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.AUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.AUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:shim-x64-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-0:15.8-2.el8_2.src", "BaseOS-8.2.0.Z.TUS:shim-ia32-0:15.8-2.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:shim-x64-0:15.8-2.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: out of bounds read when parsing MZ binaries" } ] }
rhsa-2024_1902
Vulnerability from csaf_redhat
Published
2024-04-18 17:44
Modified
2024-11-24 14:20
Summary
Red Hat Security Advisory: shim security update
Notes
Topic
An update for shim is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The shim package contains a first-stage UEFI boot loader that handles chaining
to a trusted full boot loader under secure boot environments.
Security Fix(es):
* shim: RCE in http boot support may lead to Secure Boot bypass (CVE-2023-40547)
* shim: Interger overflow leads to heap buffer overflow in verify_sbat_section
on 32-bits systems (CVE-2023-40548)
* shim: Out-of-bounds read printing error messages (CVE-2023-40546)
* shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file
(CVE-2023-40549)
* shim: Out-of-bound read in verify_buffer_sbat() (CVE-2023-40550)
* shim: out of bounds read when parsing MZ binaries (CVE-2023-40551)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for shim is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The shim package contains a first-stage UEFI boot loader that handles chaining\nto a trusted full boot loader under secure boot environments.\n\nSecurity Fix(es):\n\n* shim: RCE in http boot support may lead to Secure Boot bypass (CVE-2023-40547)\n\n* shim: Interger overflow leads to heap buffer overflow in verify_sbat_section\non 32-bits systems (CVE-2023-40548)\n\n* shim: Out-of-bounds read printing error messages (CVE-2023-40546)\n\n* shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file\n(CVE-2023-40549)\n\n* shim: Out-of-bound read in verify_buffer_sbat() (CVE-2023-40550)\n\n* shim: out of bounds read when parsing MZ binaries (CVE-2023-40551)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:1902", "url": "https://access.redhat.com/errata/RHSA-2024:1902" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2234589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589" }, { "category": "external", "summary": "2241782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782" }, { "category": "external", "summary": "2241796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241796" }, { "category": "external", "summary": "2241797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241797" }, { "category": "external", "summary": "2259915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259915" }, { "category": "external", "summary": "2259918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259918" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1902.json" } ], "title": "Red Hat Security Advisory: shim security update", "tracking": { "current_release_date": "2024-11-24T14:20:20+00:00", "generator": { "date": "2024-11-24T14:20:20+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:1902", "initial_release_date": "2024-04-18T17:44:10+00:00", "revision_history": [ { "date": "2024-04-18T17:44:10+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-04-18T17:44:10+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T14:20:20+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.9.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "shim-0:15.8-4.el8_9.src", "product": { "name": "shim-0:15.8-4.el8_9.src", "product_id": "shim-0:15.8-4.el8_9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim@15.8-4.el8_9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "shim-aa64-0:15.8-4.el8_9.aarch64", "product": { "name": "shim-aa64-0:15.8-4.el8_9.aarch64", "product_id": "shim-aa64-0:15.8-4.el8_9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-aa64@15.8-4.el8_9?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "shim-ia32-0:15.8-4.el8_9.x86_64", "product": { "name": "shim-ia32-0:15.8-4.el8_9.x86_64", "product_id": "shim-ia32-0:15.8-4.el8_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-ia32@15.8-4.el8_9?arch=x86_64" } } }, { "category": "product_version", "name": "shim-x64-0:15.8-4.el8_9.x86_64", "product": { "name": "shim-x64-0:15.8-4.el8_9.x86_64", "product_id": "shim-x64-0:15.8-4.el8_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-x64@15.8-4.el8_9?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "shim-0:15.8-4.el8_9.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src" }, "product_reference": "shim-0:15.8-4.el8_9.src", "relates_to_product_reference": "BaseOS-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "shim-aa64-0:15.8-4.el8_9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64" }, "product_reference": "shim-aa64-0:15.8-4.el8_9.aarch64", "relates_to_product_reference": "BaseOS-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "shim-ia32-0:15.8-4.el8_9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64" }, "product_reference": "shim-ia32-0:15.8-4.el8_9.x86_64", "relates_to_product_reference": "BaseOS-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "shim-x64-0:15.8-4.el8_9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" }, "product_reference": "shim-x64-0:15.8-4.el8_9.x86_64", "relates_to_product_reference": "BaseOS-8.9.0.Z.MAIN" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-40546", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241796" } ], "notes": [ { "category": "description", "text": "A flaw was found in Shim when an error happened while creating a new ESL variable. If Shim fails to create the new variable, it tries to print an error message to the user; however, the number of parameters used by the logging function doesn\u0027t match the format string used by it, leading to a crash under certain circumstances.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bounds read printing error messages", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40546" }, { "category": "external", "summary": "RHBZ#2241796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241796" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40546", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40546" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40546", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40546" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T17:44:10+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1902" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bounds read printing error messages" }, { "acknowledgments": [ { "names": [ "Bill Demirkapi" ], "organization": "Microsoft Security Response Center" } ], "cve": "CVE-2023-40547", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-05-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2234589" } ], "notes": [ { "category": "description", "text": "A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: RCE in http boot support may lead to Secure Boot bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is only exploitable when the machine is booting UEFI through the network. During startup, before loading a local boot image, Shim checks whether the system is configured to support network booting. If the check succeeds, Shim attempts to load the bootable image from the boot\u0027s previously configured server using the HTTP protocol, which exposes the system to the vulnerability described by this CVE.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40547" }, { "category": "external", "summary": "RHBZ#2234589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40547", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40547" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T17:44:10+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1902" }, { "category": "workaround", "details": "If a system isn\u2019t required to boot from the network, configure the server\u2019s boot order to disable entirely or skip the network boot.", "product_ids": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "shim: RCE in http boot support may lead to Secure Boot bypass" }, { "cve": "CVE-2023-40548", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241782" } ], "notes": [ { "category": "description", "text": "A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40548" }, { "category": "external", "summary": "RHBZ#2241782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40548", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40548" } ], "release_date": "2023-10-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T17:44:10+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1902" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems" }, { "cve": "CVE-2023-40549", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241797" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in Shim due to the lack of proper boundary verification during the load of a PE binary. This flaw allows an attacker to load a crafted PE binary, triggering the issue and crashing Shim, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40549" }, { "category": "external", "summary": "RHBZ#2241797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241797" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40549", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40549" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T17:44:10+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1902" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file" }, { "cve": "CVE-2023-40550", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-01-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259915" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in Shim when it tried to validate the SBAT information. This issue may expose sensitive data during the system\u0027s boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bound read in verify_buffer_sbat()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40550" }, { "category": "external", "summary": "RHBZ#2259915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259915" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40550", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40550" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40550", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40550" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T17:44:10+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1902" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bound read in verify_buffer_sbat()" }, { "cve": "CVE-2023-40551", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-07-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259918" } ], "notes": [ { "category": "description", "text": "A flaw was found in the MZ binary format in Shim. An out-of-bounds read may occur, leading to a crash or possible exposure of sensitive data during the system\u0027s boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: out of bounds read when parsing MZ binaries", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40551" }, { "category": "external", "summary": "RHBZ#2259918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259918" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40551", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40551" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40551", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40551" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T17:44:10+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1902" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.9.0.Z.MAIN:shim-0:15.8-4.el8_9.src", "BaseOS-8.9.0.Z.MAIN:shim-aa64-0:15.8-4.el8_9.aarch64", "BaseOS-8.9.0.Z.MAIN:shim-ia32-0:15.8-4.el8_9.x86_64", "BaseOS-8.9.0.Z.MAIN:shim-x64-0:15.8-4.el8_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: out of bounds read when parsing MZ binaries" } ] }
rhsa-2024_1959
Vulnerability from csaf_redhat
Published
2024-04-23 01:00
Modified
2024-11-24 14:20
Summary
Red Hat Security Advisory: shim security update
Notes
Topic
An update for shim is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The shim package contains a first-stage UEFI boot loader that handles chaining
to a trusted full boot loader under secure boot environments.
Security Fix(es):
* shim: RCE in http boot support may lead to Secure Boot bypass (CVE-2023-40547)
* shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems (CVE-2023-40548)
* shim: Out-of-bounds read printing error messages (CVE-2023-40546)
* shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file (CVE-2023-40549)
* shim: Out-of-bound read in verify_buffer_sbat() (CVE-2023-40550)
* shim: out of bounds read when parsing MZ binaries (CVE-2023-40551)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
IMPORTANT: The new shim revokes ALL VERSIONS of GRUB2 before grub2-2.02-0.87.el7_9.14. Therefore GRUB2 MUST be updated to the latest
version: grub2-2.02-0.87.el7_9.14 BEFORE or SIMULTANEOUSLY with this shim in order for Secure Boot to continue to work. Failure to update GRUB2 will result in an UNBOOTABLE system.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for shim is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The shim package contains a first-stage UEFI boot loader that handles chaining\nto a trusted full boot loader under secure boot environments.\n\nSecurity Fix(es):\n\n* shim: RCE in http boot support may lead to Secure Boot bypass (CVE-2023-40547)\n\n* shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems (CVE-2023-40548)\n\n* shim: Out-of-bounds read printing error messages (CVE-2023-40546)\n\n* shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file (CVE-2023-40549)\n\n* shim: Out-of-bound read in verify_buffer_sbat() (CVE-2023-40550)\n\n* shim: out of bounds read when parsing MZ binaries (CVE-2023-40551)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nIMPORTANT: The new shim revokes ALL VERSIONS of GRUB2 before grub2-2.02-0.87.el7_9.14. Therefore GRUB2 MUST be updated to the latest\nversion: grub2-2.02-0.87.el7_9.14 BEFORE or SIMULTANEOUSLY with this shim in order for Secure Boot to continue to work. Failure to update GRUB2 will result in an UNBOOTABLE system.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:1959", "url": "https://access.redhat.com/errata/RHSA-2024:1959" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2234589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589" }, { "category": "external", "summary": "2241782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782" }, { "category": "external", "summary": "2241796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241796" }, { "category": "external", "summary": "2241797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241797" }, { "category": "external", "summary": "2259915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259915" }, { "category": "external", "summary": "2259918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259918" }, { "category": "external", "summary": "RHEL-2155", "url": "https://issues.redhat.com/browse/RHEL-2155" }, { "category": "external", "summary": "RHEL-4382", "url": "https://issues.redhat.com/browse/RHEL-4382" }, { "category": "external", "summary": "RHEL-4390", "url": "https://issues.redhat.com/browse/RHEL-4390" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1959.json" } ], "title": "Red Hat Security Advisory: shim security update", "tracking": { "current_release_date": "2024-11-24T14:20:40+00:00", "generator": { "date": "2024-11-24T14:20:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:1959", "initial_release_date": "2024-04-23T01:00:12+00:00", "revision_history": [ { "date": "2024-04-23T01:00:12+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-04-23T01:00:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T14:20:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "shim-0:15.8-3.el7.src", "product": { "name": "shim-0:15.8-3.el7.src", "product_id": "shim-0:15.8-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim@15.8-3.el7?arch=src" } } }, { "category": "product_version", "name": "shim-signed-0:15.8-1.el7.src", "product": { "name": "shim-signed-0:15.8-1.el7.src", "product_id": "shim-signed-0:15.8-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-signed@15.8-1.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "shim-unsigned-ia32-0:15.8-3.el7.x86_64", "product": { "name": "shim-unsigned-ia32-0:15.8-3.el7.x86_64", "product_id": "shim-unsigned-ia32-0:15.8-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-unsigned-ia32@15.8-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "shim-unsigned-x64-0:15.8-3.el7.x86_64", "product": { "name": "shim-unsigned-x64-0:15.8-3.el7.x86_64", "product_id": "shim-unsigned-x64-0:15.8-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-unsigned-x64@15.8-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "mokutil-0:15.8-1.el7.x86_64", "product": { "name": "mokutil-0:15.8-1.el7.x86_64", "product_id": "mokutil-0:15.8-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mokutil@15.8-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "shim-ia32-0:15.8-1.el7.x86_64", "product": { "name": "shim-ia32-0:15.8-1.el7.x86_64", "product_id": "shim-ia32-0:15.8-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-ia32@15.8-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "shim-x64-0:15.8-1.el7.x86_64", "product": { "name": "shim-x64-0:15.8-1.el7.x86_64", "product_id": "shim-x64-0:15.8-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-x64@15.8-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "mokutil-debuginfo-0:15.8-1.el7.x86_64", "product": { "name": "mokutil-debuginfo-0:15.8-1.el7.x86_64", "product_id": "mokutil-debuginfo-0:15.8-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mokutil-debuginfo@15.8-1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mokutil-0:15.8-1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64" }, "product_reference": "mokutil-0:15.8-1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mokutil-debuginfo-0:15.8-1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64" }, "product_reference": "mokutil-debuginfo-0:15.8-1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "shim-0:15.8-3.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:shim-0:15.8-3.el7.src" }, "product_reference": "shim-0:15.8-3.el7.src", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "shim-ia32-0:15.8-1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64" }, "product_reference": "shim-ia32-0:15.8-1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "shim-signed-0:15.8-1.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src" }, "product_reference": "shim-signed-0:15.8-1.el7.src", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "shim-unsigned-ia32-0:15.8-3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64" }, "product_reference": "shim-unsigned-ia32-0:15.8-3.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "shim-unsigned-x64-0:15.8-3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64" }, "product_reference": "shim-unsigned-x64-0:15.8-3.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "shim-x64-0:15.8-1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" }, "product_reference": "shim-x64-0:15.8-1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mokutil-0:15.8-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64" }, "product_reference": "mokutil-0:15.8-1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mokutil-debuginfo-0:15.8-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64" }, "product_reference": "mokutil-debuginfo-0:15.8-1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "shim-0:15.8-3.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:shim-0:15.8-3.el7.src" }, "product_reference": "shim-0:15.8-3.el7.src", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "shim-ia32-0:15.8-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64" }, "product_reference": "shim-ia32-0:15.8-1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "shim-signed-0:15.8-1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src" }, "product_reference": "shim-signed-0:15.8-1.el7.src", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "shim-unsigned-ia32-0:15.8-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64" }, "product_reference": "shim-unsigned-ia32-0:15.8-3.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "shim-unsigned-x64-0:15.8-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64" }, "product_reference": "shim-unsigned-x64-0:15.8-3.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "shim-x64-0:15.8-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" }, "product_reference": "shim-x64-0:15.8-1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mokutil-0:15.8-1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64" }, "product_reference": "mokutil-0:15.8-1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mokutil-debuginfo-0:15.8-1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64" }, "product_reference": "mokutil-debuginfo-0:15.8-1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "shim-0:15.8-3.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:shim-0:15.8-3.el7.src" }, "product_reference": "shim-0:15.8-3.el7.src", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "shim-ia32-0:15.8-1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64" }, "product_reference": "shim-ia32-0:15.8-1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "shim-signed-0:15.8-1.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src" }, "product_reference": "shim-signed-0:15.8-1.el7.src", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "shim-unsigned-ia32-0:15.8-3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64" }, "product_reference": "shim-unsigned-ia32-0:15.8-3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "shim-unsigned-x64-0:15.8-3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64" }, "product_reference": "shim-unsigned-x64-0:15.8-3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "shim-x64-0:15.8-1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" }, "product_reference": "shim-x64-0:15.8-1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-40546", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241796" } ], "notes": [ { "category": "description", "text": "A flaw was found in Shim when an error happened while creating a new ESL variable. If Shim fails to create the new variable, it tries to print an error message to the user; however, the number of parameters used by the logging function doesn\u0027t match the format string used by it, leading to a crash under certain circumstances.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bounds read printing error messages", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40546" }, { "category": "external", "summary": "RHBZ#2241796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241796" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40546", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40546" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40546", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40546" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-23T01:00:12+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1959" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bounds read printing error messages" }, { "acknowledgments": [ { "names": [ "Bill Demirkapi" ], "organization": "Microsoft Security Response Center" } ], "cve": "CVE-2023-40547", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-05-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2234589" } ], "notes": [ { "category": "description", "text": "A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: RCE in http boot support may lead to Secure Boot bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is only exploitable when the machine is booting UEFI through the network. During startup, before loading a local boot image, Shim checks whether the system is configured to support network booting. If the check succeeds, Shim attempts to load the bootable image from the boot\u0027s previously configured server using the HTTP protocol, which exposes the system to the vulnerability described by this CVE.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40547" }, { "category": "external", "summary": "RHBZ#2234589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40547", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40547" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-23T01:00:12+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1959" }, { "category": "workaround", "details": "If a system isn\u2019t required to boot from the network, configure the server\u2019s boot order to disable entirely or skip the network boot.", "product_ids": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "shim: RCE in http boot support may lead to Secure Boot bypass" }, { "cve": "CVE-2023-40548", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241782" } ], "notes": [ { "category": "description", "text": "A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40548" }, { "category": "external", "summary": "RHBZ#2241782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40548", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40548" } ], "release_date": "2023-10-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-23T01:00:12+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1959" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems" }, { "cve": "CVE-2023-40549", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241797" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in Shim due to the lack of proper boundary verification during the load of a PE binary. This flaw allows an attacker to load a crafted PE binary, triggering the issue and crashing Shim, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40549" }, { "category": "external", "summary": "RHBZ#2241797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241797" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40549", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40549" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-23T01:00:12+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1959" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file" }, { "cve": "CVE-2023-40550", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-01-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259915" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in Shim when it tried to validate the SBAT information. This issue may expose sensitive data during the system\u0027s boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bound read in verify_buffer_sbat()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40550" }, { "category": "external", "summary": "RHBZ#2259915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259915" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40550", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40550" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40550", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40550" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-23T01:00:12+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1959" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bound read in verify_buffer_sbat()" }, { "cve": "CVE-2023-40551", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-07-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259918" } ], "notes": [ { "category": "description", "text": "A flaw was found in the MZ binary format in Shim. An out-of-bounds read may occur, leading to a crash or possible exposure of sensitive data during the system\u0027s boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: out of bounds read when parsing MZ binaries", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40551" }, { "category": "external", "summary": "RHBZ#2259918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259918" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40551", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40551" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40551", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40551" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-23T01:00:12+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1959" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Client-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-0:15.8-3.el7.src", "7Client-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Client-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Client-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Client-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Server-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-0:15.8-3.el7.src", "7Server-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Server-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Server-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Server-7.9.Z:shim-x64-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:mokutil-debuginfo-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-0:15.8-3.el7.src", "7Workstation-7.9.Z:shim-ia32-0:15.8-1.el7.x86_64", "7Workstation-7.9.Z:shim-signed-0:15.8-1.el7.src", "7Workstation-7.9.Z:shim-unsigned-ia32-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-unsigned-x64-0:15.8-3.el7.x86_64", "7Workstation-7.9.Z:shim-x64-0:15.8-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: out of bounds read when parsing MZ binaries" } ] }
rhsa-2024_1876
Vulnerability from csaf_redhat
Published
2024-04-18 01:47
Modified
2024-11-24 14:20
Summary
Red Hat Security Advisory: shim bug fix update
Notes
Topic
An update for shim is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The shim package contains a first-stage UEFI boot loader that handles chaining to a trusted full boot loader under secure boot environments.
Security Fix(es):
* shim: RCE in http boot support may lead to Secure Boot bypass (CVE-2023-40547)
* shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems (CVE-2023-40548)
* shim: Out-of-bounds read printing error messages (CVE-2023-40546)
* shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file (CVE-2023-40549)
* shim: Out-of-bound read in verify_buffer_sbat() (CVE-2023-40550)
* shim: out of bounds read when parsing MZ binaries (CVE-2023-40551)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for shim is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The shim package contains a first-stage UEFI boot loader that handles chaining to a trusted full boot loader under secure boot environments.\n\nSecurity Fix(es):\n\n* shim: RCE in http boot support may lead to Secure Boot bypass (CVE-2023-40547)\n\n* shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems (CVE-2023-40548)\n\n* shim: Out-of-bounds read printing error messages (CVE-2023-40546)\n\n* shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file (CVE-2023-40549)\n\n* shim: Out-of-bound read in verify_buffer_sbat() (CVE-2023-40550)\n\n* shim: out of bounds read when parsing MZ binaries (CVE-2023-40551)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:1876", "url": "https://access.redhat.com/errata/RHSA-2024:1876" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2234589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589" }, { "category": "external", "summary": "2241782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782" }, { "category": "external", "summary": "2241796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241796" }, { "category": "external", "summary": "2241797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241797" }, { "category": "external", "summary": "2259915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259915" }, { "category": "external", "summary": "2259918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259918" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1876.json" } ], "title": "Red Hat Security Advisory: shim bug fix update", "tracking": { "current_release_date": "2024-11-24T14:20:01+00:00", "generator": { "date": "2024-11-24T14:20:01+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:1876", "initial_release_date": "2024-04-18T01:47:33+00:00", "revision_history": [ { "date": "2024-04-18T01:47:33+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-04-18T01:47:33+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T14:20:01+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product": { "name": "Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:9.2::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "shim-0:15.8-3.el9_2.src", "product": { "name": "shim-0:15.8-3.el9_2.src", "product_id": "shim-0:15.8-3.el9_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim@15.8-3.el9_2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "shim-aa64-0:15.8-3.el9_2.aarch64", "product": { "name": "shim-aa64-0:15.8-3.el9_2.aarch64", "product_id": "shim-aa64-0:15.8-3.el9_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-aa64@15.8-3.el9_2?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "shim-x64-0:15.8-3.el9_2.x86_64", "product": { "name": "shim-x64-0:15.8-3.el9_2.x86_64", "product_id": "shim-x64-0:15.8-3.el9_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-x64@15.8-3.el9_2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "shim-0:15.8-3.el9_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src" }, "product_reference": "shim-0:15.8-3.el9_2.src", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-aa64-0:15.8-3.el9_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64" }, "product_reference": "shim-aa64-0:15.8-3.el9_2.aarch64", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-x64-0:15.8-3.el9_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" }, "product_reference": "shim-x64-0:15.8-3.el9_2.x86_64", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-40546", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241796" } ], "notes": [ { "category": "description", "text": "A flaw was found in Shim when an error happened while creating a new ESL variable. If Shim fails to create the new variable, it tries to print an error message to the user; however, the number of parameters used by the logging function doesn\u0027t match the format string used by it, leading to a crash under certain circumstances.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bounds read printing error messages", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40546" }, { "category": "external", "summary": "RHBZ#2241796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241796" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40546", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40546" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40546", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40546" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T01:47:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1876" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bounds read printing error messages" }, { "acknowledgments": [ { "names": [ "Bill Demirkapi" ], "organization": "Microsoft Security Response Center" } ], "cve": "CVE-2023-40547", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-05-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2234589" } ], "notes": [ { "category": "description", "text": "A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: RCE in http boot support may lead to Secure Boot bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is only exploitable when the machine is booting UEFI through the network. During startup, before loading a local boot image, Shim checks whether the system is configured to support network booting. If the check succeeds, Shim attempts to load the bootable image from the boot\u0027s previously configured server using the HTTP protocol, which exposes the system to the vulnerability described by this CVE.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40547" }, { "category": "external", "summary": "RHBZ#2234589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40547", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40547" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T01:47:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1876" }, { "category": "workaround", "details": "If a system isn\u2019t required to boot from the network, configure the server\u2019s boot order to disable entirely or skip the network boot.", "product_ids": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "shim: RCE in http boot support may lead to Secure Boot bypass" }, { "cve": "CVE-2023-40548", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241782" } ], "notes": [ { "category": "description", "text": "A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40548" }, { "category": "external", "summary": "RHBZ#2241782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40548", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40548" } ], "release_date": "2023-10-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T01:47:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1876" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems" }, { "cve": "CVE-2023-40549", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241797" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in Shim due to the lack of proper boundary verification during the load of a PE binary. This flaw allows an attacker to load a crafted PE binary, triggering the issue and crashing Shim, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40549" }, { "category": "external", "summary": "RHBZ#2241797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241797" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40549", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40549" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T01:47:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1876" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file" }, { "cve": "CVE-2023-40550", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-01-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259915" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in Shim when it tried to validate the SBAT information. This issue may expose sensitive data during the system\u0027s boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bound read in verify_buffer_sbat()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40550" }, { "category": "external", "summary": "RHBZ#2259915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259915" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40550", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40550" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40550", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40550" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T01:47:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1876" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bound read in verify_buffer_sbat()" }, { "cve": "CVE-2023-40551", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-07-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259918" } ], "notes": [ { "category": "description", "text": "A flaw was found in the MZ binary format in Shim. An out-of-bounds read may occur, leading to a crash or possible exposure of sensitive data during the system\u0027s boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: out of bounds read when parsing MZ binaries", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40551" }, { "category": "external", "summary": "RHBZ#2259918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259918" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40551", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40551" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40551", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40551" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T01:47:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1876" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-9.2.0.Z.EUS:shim-0:15.8-3.el9_2.src", "BaseOS-9.2.0.Z.EUS:shim-aa64-0:15.8-3.el9_2.aarch64", "BaseOS-9.2.0.Z.EUS:shim-x64-0:15.8-3.el9_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: out of bounds read when parsing MZ binaries" } ] }
rhsa-2024_1835
Vulnerability from csaf_redhat
Published
2024-04-16 13:45
Modified
2024-11-24 14:19
Summary
Red Hat Security Advisory: shim security update
Notes
Topic
An update for shim is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The shim package contains a first stage UEFI boot loader that handles chaining to a trusted full boot loader under secure boot environments.
Security Fix(es):
* shim: RCE in http boot support may lead to Secure Boot bypass (CVE-2023-40547)
* shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems (CVE-2023-40548)
* shim: Out-of-bounds read printing error messages (CVE-2023-40546)
* shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file (CVE-2023-40549)
* shim: Out-of-bound read in verify_buffer_sbat() (CVE-2023-40550)
* shim: out of bounds read when parsing MZ binaries (CVE-2023-40551)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for shim is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The shim package contains a first stage UEFI boot loader that handles chaining to a trusted full boot loader under secure boot environments.\n\nSecurity Fix(es):\n\n* shim: RCE in http boot support may lead to Secure Boot bypass (CVE-2023-40547)\n\n* shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems (CVE-2023-40548)\n\n* shim: Out-of-bounds read printing error messages (CVE-2023-40546)\n\n* shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file (CVE-2023-40549)\n\n* shim: Out-of-bound read in verify_buffer_sbat() (CVE-2023-40550)\n\n* shim: out of bounds read when parsing MZ binaries (CVE-2023-40551)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:1835", "url": "https://access.redhat.com/errata/RHSA-2024:1835" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2234589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589" }, { "category": "external", "summary": "2241782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782" }, { "category": "external", "summary": "2241796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241796" }, { "category": "external", "summary": "2241797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241797" }, { "category": "external", "summary": "2259915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259915" }, { "category": "external", "summary": "2259918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259918" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1835.json" } ], "title": "Red Hat Security Advisory: shim security update", "tracking": { "current_release_date": "2024-11-24T14:19:30+00:00", "generator": { "date": "2024-11-24T14:19:30+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:1835", "initial_release_date": "2024-04-16T13:45:47+00:00", "revision_history": [ { "date": "2024-04-16T13:45:47+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-04-16T13:45:47+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T14:19:30+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:9.0::appstream" } } }, { "category": "product_name", "name": "Red Hat CodeReady Linux Builder EUS (v.9.0)", "product": { "name": "Red Hat CodeReady Linux Builder EUS (v.9.0)", "product_id": "CRB-9.0.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:9.0::crb" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS EUS (v.9.0)", "product": { "name": "Red Hat Enterprise Linux BaseOS EUS (v.9.0)", "product_id": "BaseOS-9.0.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:9.0::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "shim-unsigned-aarch64-0:15.8-2.el9.src", "product": { "name": "shim-unsigned-aarch64-0:15.8-2.el9.src", "product_id": "shim-unsigned-aarch64-0:15.8-2.el9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-unsigned-aarch64@15.8-2.el9?arch=src" } } }, { "category": "product_version", "name": "shim-unsigned-x64-0:15.8-2.el9.src", "product": { "name": "shim-unsigned-x64-0:15.8-2.el9.src", "product_id": "shim-unsigned-x64-0:15.8-2.el9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-unsigned-x64@15.8-2.el9?arch=src" } } }, { "category": "product_version", "name": "shim-0:15.8-3.el9.src", "product": { "name": "shim-0:15.8-3.el9.src", "product_id": "shim-0:15.8-3.el9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim@15.8-3.el9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "product": { "name": "shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "product_id": "shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-unsigned-aarch64@15.8-2.el9?arch=aarch64" } } }, { "category": "product_version", "name": "shim-aa64-0:15.8-3.el9.aarch64", "product": { "name": "shim-aa64-0:15.8-3.el9.aarch64", "product_id": "shim-aa64-0:15.8-3.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-aa64@15.8-3.el9?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "shim-unsigned-x64-0:15.8-2.el9.x86_64", "product": { "name": "shim-unsigned-x64-0:15.8-2.el9.x86_64", "product_id": "shim-unsigned-x64-0:15.8-2.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-unsigned-x64@15.8-2.el9?arch=x86_64" } } }, { "category": "product_version", "name": "shim-x64-0:15.8-3.el9.x86_64", "product": { "name": "shim-x64-0:15.8-3.el9.x86_64", "product_id": "shim-x64-0:15.8-3.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/shim-x64@15.8-3.el9?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "shim-unsigned-aarch64-0:15.8-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64" }, "product_reference": "shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-unsigned-aarch64-0:15.8-2.el9.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src" }, "product_reference": "shim-unsigned-aarch64-0:15.8-2.el9.src", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-0:15.8-3.el9.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)", "product_id": "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src" }, "product_reference": "shim-0:15.8-3.el9.src", "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-aa64-0:15.8-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)", "product_id": "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64" }, "product_reference": "shim-aa64-0:15.8-3.el9.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-x64-0:15.8-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)", "product_id": "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64" }, "product_reference": "shim-x64-0:15.8-3.el9.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-unsigned-x64-0:15.8-2.el9.src as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)", "product_id": "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src" }, "product_reference": "shim-unsigned-x64-0:15.8-2.el9.src", "relates_to_product_reference": "CRB-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "shim-unsigned-x64-0:15.8-2.el9.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)", "product_id": "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" }, "product_reference": "shim-unsigned-x64-0:15.8-2.el9.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-40546", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241796" } ], "notes": [ { "category": "description", "text": "A flaw was found in Shim when an error happened while creating a new ESL variable. If Shim fails to create the new variable, it tries to print an error message to the user; however, the number of parameters used by the logging function doesn\u0027t match the format string used by it, leading to a crash under certain circumstances.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bounds read printing error messages", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40546" }, { "category": "external", "summary": "RHBZ#2241796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241796" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40546", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40546" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40546", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40546" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-16T13:45:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to: \n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1835" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bounds read printing error messages" }, { "acknowledgments": [ { "names": [ "Bill Demirkapi" ], "organization": "Microsoft Security Response Center" } ], "cve": "CVE-2023-40547", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-05-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2234589" } ], "notes": [ { "category": "description", "text": "A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: RCE in http boot support may lead to Secure Boot bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is only exploitable when the machine is booting UEFI through the network. During startup, before loading a local boot image, Shim checks whether the system is configured to support network booting. If the check succeeds, Shim attempts to load the bootable image from the boot\u0027s previously configured server using the HTTP protocol, which exposes the system to the vulnerability described by this CVE.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40547" }, { "category": "external", "summary": "RHBZ#2234589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234589" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40547", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40547" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-16T13:45:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to: \n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1835" }, { "category": "workaround", "details": "If a system isn\u2019t required to boot from the network, configure the server\u2019s boot order to disable entirely or skip the network boot.", "product_ids": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "shim: RCE in http boot support may lead to Secure Boot bypass" }, { "cve": "CVE-2023-40548", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241782" } ], "notes": [ { "category": "description", "text": "A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40548" }, { "category": "external", "summary": "RHBZ#2241782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40548", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40548" } ], "release_date": "2023-10-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-16T13:45:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to: \n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1835" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems" }, { "cve": "CVE-2023-40549", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241797" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in Shim due to the lack of proper boundary verification during the load of a PE binary. This flaw allows an attacker to load a crafted PE binary, triggering the issue and crashing Shim, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40549" }, { "category": "external", "summary": "RHBZ#2241797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241797" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40549", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40549" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-16T13:45:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to: \n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1835" }, { "category": "workaround", "details": "There\u0027s no available mitigation for this issue.", "product_ids": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file" }, { "cve": "CVE-2023-40550", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-01-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259915" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in Shim when it tried to validate the SBAT information. This issue may expose sensitive data during the system\u0027s boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: Out-of-bound read in verify_buffer_sbat()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40550" }, { "category": "external", "summary": "RHBZ#2259915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259915" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40550", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40550" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40550", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40550" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-16T13:45:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to: \n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1835" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: Out-of-bound read in verify_buffer_sbat()" }, { "cve": "CVE-2023-40551", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-07-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259918" } ], "notes": [ { "category": "description", "text": "A flaw was found in the MZ binary format in Shim. An out-of-bounds read may occur, leading to a crash or possible exposure of sensitive data during the system\u0027s boot phase.", "title": "Vulnerability description" }, { "category": "summary", "text": "shim: out of bounds read when parsing MZ binaries", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40551" }, { "category": "external", "summary": "RHBZ#2259918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259918" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40551", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40551" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40551", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40551" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-16T13:45:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to: \n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1835" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.aarch64", "AppStream-9.0.0.Z.EUS:shim-unsigned-aarch64-0:15.8-2.el9.src", "BaseOS-9.0.0.Z.EUS:shim-0:15.8-3.el9.src", "BaseOS-9.0.0.Z.EUS:shim-aa64-0:15.8-3.el9.aarch64", "BaseOS-9.0.0.Z.EUS:shim-x64-0:15.8-3.el9.x86_64", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.src", "CRB-9.0.0.Z.EUS:shim-unsigned-x64-0:15.8-2.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shim: out of bounds read when parsing MZ binaries" } ] }
WID-SEC-W-2024-0903
Vulnerability from csaf_certbund
Published
2024-04-16 22:00
Modified
2024-05-14 22:00
Summary
Red Hat Enterprise Linux (shim): Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Red Hat Enterprise Linux (RHEL) ist eine populäre Linux-Distribution.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux in "shim" ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder beliebigen Code auszuführen.
Betroffene Betriebssysteme
- Linux
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux in \"shim\" ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder beliebigen Code auszuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0903 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0903.json" }, { "category": "self", "summary": "WID-SEC-2024-0903 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0903" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2024-04-16", "url": "https://access.redhat.com/errata/RHSA-2024:1834" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2024-04-16", "url": "https://access.redhat.com/errata/RHSA-2024:1835" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1873 vom 2024-04-18", "url": "https://access.redhat.com/errata/RHSA-2024:1873" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1883 vom 2024-04-18", "url": "https://access.redhat.com/errata/RHSA-2024:1883" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1876 vom 2024-04-18", "url": "https://access.redhat.com/errata/RHSA-2024:1876" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1903 vom 2024-04-18", "url": "https://access.redhat.com/errata/RHSA-2024:1903" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1902 vom 2024-04-18", "url": "https://access.redhat.com/errata/RHSA-2024:1902" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1368-1 vom 2024-04-22", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018392.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1959 vom 2024-04-23", "url": "https://access.redhat.com/errata/RHSA-2024:1959" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-1903 vom 2024-04-24", "url": "http://linux.oracle.com/errata/ELSA-2024-1903.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-1902 vom 2024-04-26", "url": "https://linux.oracle.com/errata/ELSA-2024-1902.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2086 vom 2024-04-29", "url": "https://access.redhat.com/errata/RHSA-2024:2086" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-1959 vom 2024-05-03", "url": "https://linux.oracle.com/errata/ELSA-2024-1959.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3813 vom 2024-05-14", "url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html" } ], "source_lang": "en-US", "title": "Red Hat Enterprise Linux (shim): Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-05-14T22:00:00.000+00:00", "generator": { "date": "2024-05-15T09:33:14.940+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0903", "initial_release_date": "2024-04-16T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-16T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-04-17T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-04-22T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE und Red Hat aufgenommen" }, { "date": "2024-04-24T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-04-25T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-04-28T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-05-02T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-05-14T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Debian aufgenommen" } ], "status": "final", "version": "8" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "category": "product_version", "name": "8.2", "product": { "name": "Red Hat Enterprise Linux 8.2", "product_id": "T034282", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8.2" } } }, { "category": "product_version", "name": "9", "product": { "name": "Red Hat Enterprise Linux 9", "product_id": "T034283", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:9" } } } ], "category": "product_name", "name": "Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-40546", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Red Hat Enterprise Linux. Dieser Fehler besteht in der Shim-Komponente aufgrund eines Heap-basierten Puffer\u00fcberlaufs und eines Out-of-bounds-Read-Problems. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "T034282", "67646", "T034283", "T004914" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-40546" }, { "cve": "CVE-2023-40548", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Red Hat Enterprise Linux. Dieser Fehler besteht in der Shim-Komponente aufgrund eines Heap-basierten Puffer\u00fcberlaufs und eines Out-of-bounds-Read-Problems. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "T034282", "67646", "T034283", "T004914" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-40548" }, { "cve": "CVE-2023-40549", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Red Hat Enterprise Linux. Dieser Fehler besteht in der Shim-Komponente aufgrund eines Heap-basierten Puffer\u00fcberlaufs und eines Out-of-bounds-Read-Problems. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "T034282", "67646", "T034283", "T004914" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-40549" }, { "cve": "CVE-2023-40547", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Red Hat Enterprise Linux. Dieser Fehler besteht in der Shim-Komponente aufgrund eines Out-of-bounds-Write-Problems, das eine vollst\u00e4ndige Kompromittierung des Systems erm\u00f6glicht. Ein benachbarter, anonymer Angreifer kann diese Schwachstelle zur Ausf\u00fchrung von beliebigem Code ausnutzen." } ], "product_status": { "known_affected": [ "2951", "T002207", "T034282", "67646", "T034283", "T004914" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-40547" }, { "cve": "CVE-2023-40550", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Red Hat Enterprise Linux. Dieser Fehler besteht in der Shim-Komponente w\u00e4hrend der Validierung der SBAT-Informationen, was dazu f\u00fchrt, dass sensible Daten w\u00e4hrend der Boot-Phase des Systems offengelegt werden. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "2951", "T002207", "T034282", "67646", "T034283", "T004914" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-40550" }, { "cve": "CVE-2023-40551", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Red Hat Enterprise Linux. Dieser Fehler besteht im MZ-Bin\u00e4rformat in der Shim-Komponente aufgrund eines Out-of-bounds-Read-Problems. Ein lokaler, privilegierter Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "T034282", "67646", "T034283", "T004914" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-40551" } ] }
WID-SEC-W-2024-1313
Vulnerability from csaf_certbund
Published
2024-06-06 22:00
Modified
2024-06-06 22:00
Summary
IBM QRadar SIEM: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
IBM QRadar Security Information and Event Management (SIEM) bietet Unterstützung bei der Erkennung und Priorisierung von Sicherheitsbedrohungen im Unternehmen.
Angriff
Ein Angreifer kann mehrere Schwachstellen in IBM QRadar SIEM ausnutzen, um Dateien zu manipulieren, um einen Denial-of-Service-Zustand erzuegen, um vertrauliche Informationen offenzulegen, um die Sicherheitsmaßnahmen zu umgehen und beliebigen Code auszuführen.
Betroffene Betriebssysteme
- Sonstiges
- UNIX
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM QRadar Security Information and Event Management (SIEM) bietet Unterst\u00fctzung bei der Erkennung und Priorisierung von Sicherheitsbedrohungen im Unternehmen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in IBM QRadar SIEM ausnutzen, um Dateien zu manipulieren, um einen Denial-of-Service-Zustand erzuegen, um vertrauliche Informationen offenzulegen, um die Sicherheitsma\u00dfnahmen zu umgehen und beliebigen Code auszuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges\n- UNIX", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1313 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1313.json" }, { "category": "self", "summary": "WID-SEC-2024-1313 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1313" }, { "category": "external", "summary": "IBM Security Bulletin vom 2024-06-06", "url": "https://www.ibm.com/support/pages/node/7156667" } ], "source_lang": "en-US", "title": "IBM QRadar SIEM: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-06-06T22:00:00.000+00:00", "generator": { "date": "2024-06-07T08:08:08.226+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-1313", "initial_release_date": "2024-06-06T22:00:00.000+00:00", "revision_history": [ { "date": "2024-06-06T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 7.5.0 UP8 IF03", "product": { "name": "IBM QRadar SIEM \u003c 7.5.0 UP8 IF03", "product_id": "T035249", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up8_if03" } } } ], "category": "product_name", "name": "QRadar SIEM" } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-22243", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese Fehler betreffen das VMware Tanzu Spring Framework aufgrund eines offenen Redirects in UriComponentsBuilder. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Phising-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2024-06-06T22:00:00Z", "title": "CVE-2024-22243" }, { "cve": "CVE-2024-22259", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese Fehler betreffen das VMware Tanzu Spring Framework aufgrund eines offenen Redirects in UriComponentsBuilder. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Phising-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2024-06-06T22:00:00Z", "title": "CVE-2024-22259" }, { "cve": "CVE-2024-22262", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese Fehler betreffen das VMware Tanzu Spring Framework aufgrund eines offenen Redirects in UriComponentsBuilder. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Phising-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2024-06-06T22:00:00Z", "title": "CVE-2024-22262" }, { "cve": "CVE-2023-40546", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen in den Komponenten ISC BIND und rhboot shim. Diese bestehen aufgrund unsachgem\u00e4\u00dfem Parsing, Fehlern bei der Antwortverarbeitung, einer NULL-Zeiger-Dereferenz und einem Out-of-Bounds-Read-Fehler. Ein entfernter, anonymer oder ein lokaler, privilegierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen." } ], "release_date": "2024-06-06T22:00:00Z", "title": "CVE-2023-40546" }, { "cve": "CVE-2023-40549", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen in den Komponenten ISC BIND und rhboot shim. Diese bestehen aufgrund unsachgem\u00e4\u00dfem Parsing, Fehlern bei der Antwortverarbeitung, einer NULL-Zeiger-Dereferenz und einem Out-of-Bounds-Read-Fehler. Ein entfernter, anonymer oder ein lokaler, privilegierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen." } ], "release_date": "2024-06-06T22:00:00Z", "title": "CVE-2023-40549" }, { "cve": "CVE-2023-40551", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen in den Komponenten ISC BIND und rhboot shim. Diese bestehen aufgrund unsachgem\u00e4\u00dfem Parsing, Fehlern bei der Antwortverarbeitung, einer NULL-Zeiger-Dereferenz und einem Out-of-Bounds-Read-Fehler. Ein entfernter, anonymer oder ein lokaler, privilegierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen." } ], "release_date": "2024-06-06T22:00:00Z", "title": "CVE-2023-40551" }, { "cve": "CVE-2023-4408", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen in den Komponenten ISC BIND und rhboot shim. Diese bestehen aufgrund unsachgem\u00e4\u00dfem Parsing, Fehlern bei der Antwortverarbeitung, einer NULL-Zeiger-Dereferenz und einem Out-of-Bounds-Read-Fehler. Ein entfernter, anonymer oder ein lokaler, privilegierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen." } ], "release_date": "2024-06-06T22:00:00Z", "title": "CVE-2023-4408" }, { "cve": "CVE-2023-50387", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen in den Komponenten ISC BIND und rhboot shim. Diese bestehen aufgrund unsachgem\u00e4\u00dfem Parsing, Fehlern bei der Antwortverarbeitung, einer NULL-Zeiger-Dereferenz und einem Out-of-Bounds-Read-Fehler. Ein entfernter, anonymer oder ein lokaler, privilegierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen." } ], "release_date": "2024-06-06T22:00:00Z", "title": "CVE-2023-50387" }, { "cve": "CVE-2023-50868", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen in den Komponenten ISC BIND und rhboot shim. Diese bestehen aufgrund unsachgem\u00e4\u00dfem Parsing, Fehlern bei der Antwortverarbeitung, einer NULL-Zeiger-Dereferenz und einem Out-of-Bounds-Read-Fehler. Ein entfernter, anonymer oder ein lokaler, privilegierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen." } ], "release_date": "2024-06-06T22:00:00Z", "title": "CVE-2023-50868" }, { "cve": "CVE-2023-40547", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese Fehler bestehen in rhboot-Shim aufgrund eines Out-of-Bounds-Write und eines Heap-basierten Puffer\u00fcberlaufs. Ein Angreifer aus einem angrenzenden Netzwerk oder ein lokaler Angreifer kann diese Schwachstellen zur Ausf\u00fchrung von beliebigem Code ausnutzen." } ], "release_date": "2024-06-06T22:00:00Z", "title": "CVE-2023-40547" }, { "cve": "CVE-2023-40548", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese Fehler bestehen in rhboot-Shim aufgrund eines Out-of-Bounds-Write und eines Heap-basierten Puffer\u00fcberlaufs. Ein Angreifer aus einem angrenzenden Netzwerk oder ein lokaler Angreifer kann diese Schwachstellen zur Ausf\u00fchrung von beliebigem Code ausnutzen." } ], "release_date": "2024-06-06T22:00:00Z", "title": "CVE-2023-40548" }, { "cve": "CVE-2023-40550", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese Fehler besteht in rhboot-Shim aufgrund eines Out-of-Bound-Lesefehlers in der Funktion verify_buffer_sbat(). Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um vertrauliche Informationen offenzulegen." } ], "release_date": "2024-06-06T22:00:00Z", "title": "CVE-2023-40550" }, { "cve": "CVE-2023-3758", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen in der SSSD-Komponente. Die GPO-Richtlinie f\u00fcr authentifizierte Benutzer wird nicht konsistent angewendet. Ein Angreifer aus einem angrenzenden Netzwerk kann diese Schwachstelle ausnutzen, um Sicherheitsma\u00dfnahmen bzgl. Autorisierung zu umgehen." } ], "release_date": "2024-06-06T22:00:00Z", "title": "CVE-2023-3758" } ] }
wid-sec-w-2024-0903
Vulnerability from csaf_certbund
Published
2024-04-16 22:00
Modified
2024-05-14 22:00
Summary
Red Hat Enterprise Linux (shim): Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Red Hat Enterprise Linux (RHEL) ist eine populäre Linux-Distribution.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux in "shim" ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder beliebigen Code auszuführen.
Betroffene Betriebssysteme
- Linux
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux in \"shim\" ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder beliebigen Code auszuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0903 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0903.json" }, { "category": "self", "summary": "WID-SEC-2024-0903 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0903" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2024-04-16", "url": "https://access.redhat.com/errata/RHSA-2024:1834" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2024-04-16", "url": "https://access.redhat.com/errata/RHSA-2024:1835" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1873 vom 2024-04-18", "url": "https://access.redhat.com/errata/RHSA-2024:1873" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1883 vom 2024-04-18", "url": "https://access.redhat.com/errata/RHSA-2024:1883" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1876 vom 2024-04-18", "url": "https://access.redhat.com/errata/RHSA-2024:1876" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1903 vom 2024-04-18", "url": "https://access.redhat.com/errata/RHSA-2024:1903" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1902 vom 2024-04-18", "url": "https://access.redhat.com/errata/RHSA-2024:1902" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:1368-1 vom 2024-04-22", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018392.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1959 vom 2024-04-23", "url": "https://access.redhat.com/errata/RHSA-2024:1959" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-1903 vom 2024-04-24", "url": "http://linux.oracle.com/errata/ELSA-2024-1903.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-1902 vom 2024-04-26", "url": "https://linux.oracle.com/errata/ELSA-2024-1902.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2086 vom 2024-04-29", "url": "https://access.redhat.com/errata/RHSA-2024:2086" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-1959 vom 2024-05-03", "url": "https://linux.oracle.com/errata/ELSA-2024-1959.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3813 vom 2024-05-14", "url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html" } ], "source_lang": "en-US", "title": "Red Hat Enterprise Linux (shim): Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-05-14T22:00:00.000+00:00", "generator": { "date": "2024-05-15T09:33:14.940+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0903", "initial_release_date": "2024-04-16T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-16T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-04-17T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-04-22T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE und Red Hat aufgenommen" }, { "date": "2024-04-24T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-04-25T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-04-28T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-05-02T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-05-14T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Debian aufgenommen" } ], "status": "final", "version": "8" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "category": "product_version", "name": "8.2", "product": { "name": "Red Hat Enterprise Linux 8.2", "product_id": "T034282", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8.2" } } }, { "category": "product_version", "name": "9", "product": { "name": "Red Hat Enterprise Linux 9", "product_id": "T034283", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:9" } } } ], "category": "product_name", "name": "Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-40546", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Red Hat Enterprise Linux. Dieser Fehler besteht in der Shim-Komponente aufgrund eines Heap-basierten Puffer\u00fcberlaufs und eines Out-of-bounds-Read-Problems. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "T034282", "67646", "T034283", "T004914" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-40546" }, { "cve": "CVE-2023-40548", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Red Hat Enterprise Linux. Dieser Fehler besteht in der Shim-Komponente aufgrund eines Heap-basierten Puffer\u00fcberlaufs und eines Out-of-bounds-Read-Problems. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "T034282", "67646", "T034283", "T004914" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-40548" }, { "cve": "CVE-2023-40549", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Red Hat Enterprise Linux. Dieser Fehler besteht in der Shim-Komponente aufgrund eines Heap-basierten Puffer\u00fcberlaufs und eines Out-of-bounds-Read-Problems. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "T034282", "67646", "T034283", "T004914" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-40549" }, { "cve": "CVE-2023-40547", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Red Hat Enterprise Linux. Dieser Fehler besteht in der Shim-Komponente aufgrund eines Out-of-bounds-Write-Problems, das eine vollst\u00e4ndige Kompromittierung des Systems erm\u00f6glicht. Ein benachbarter, anonymer Angreifer kann diese Schwachstelle zur Ausf\u00fchrung von beliebigem Code ausnutzen." } ], "product_status": { "known_affected": [ "2951", "T002207", "T034282", "67646", "T034283", "T004914" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-40547" }, { "cve": "CVE-2023-40550", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Red Hat Enterprise Linux. Dieser Fehler besteht in der Shim-Komponente w\u00e4hrend der Validierung der SBAT-Informationen, was dazu f\u00fchrt, dass sensible Daten w\u00e4hrend der Boot-Phase des Systems offengelegt werden. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "2951", "T002207", "T034282", "67646", "T034283", "T004914" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-40550" }, { "cve": "CVE-2023-40551", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Red Hat Enterprise Linux. Dieser Fehler besteht im MZ-Bin\u00e4rformat in der Shim-Komponente aufgrund eines Out-of-bounds-Read-Problems. Ein lokaler, privilegierter Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "T034282", "67646", "T034283", "T004914" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-40551" } ] }
wid-sec-w-2024-1313
Vulnerability from csaf_certbund
Published
2024-06-06 22:00
Modified
2024-06-06 22:00
Summary
IBM QRadar SIEM: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
IBM QRadar Security Information and Event Management (SIEM) bietet Unterstützung bei der Erkennung und Priorisierung von Sicherheitsbedrohungen im Unternehmen.
Angriff
Ein Angreifer kann mehrere Schwachstellen in IBM QRadar SIEM ausnutzen, um Dateien zu manipulieren, um einen Denial-of-Service-Zustand erzuegen, um vertrauliche Informationen offenzulegen, um die Sicherheitsmaßnahmen zu umgehen und beliebigen Code auszuführen.
Betroffene Betriebssysteme
- Sonstiges
- UNIX
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM QRadar Security Information and Event Management (SIEM) bietet Unterst\u00fctzung bei der Erkennung und Priorisierung von Sicherheitsbedrohungen im Unternehmen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in IBM QRadar SIEM ausnutzen, um Dateien zu manipulieren, um einen Denial-of-Service-Zustand erzuegen, um vertrauliche Informationen offenzulegen, um die Sicherheitsma\u00dfnahmen zu umgehen und beliebigen Code auszuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges\n- UNIX", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1313 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1313.json" }, { "category": "self", "summary": "WID-SEC-2024-1313 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1313" }, { "category": "external", "summary": "IBM Security Bulletin vom 2024-06-06", "url": "https://www.ibm.com/support/pages/node/7156667" } ], "source_lang": "en-US", "title": "IBM QRadar SIEM: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-06-06T22:00:00.000+00:00", "generator": { "date": "2024-06-07T08:08:08.226+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-1313", "initial_release_date": "2024-06-06T22:00:00.000+00:00", "revision_history": [ { "date": "2024-06-06T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 7.5.0 UP8 IF03", "product": { "name": "IBM QRadar SIEM \u003c 7.5.0 UP8 IF03", "product_id": "T035249", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up8_if03" } } } ], "category": "product_name", "name": "QRadar SIEM" } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-22243", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese Fehler betreffen das VMware Tanzu Spring Framework aufgrund eines offenen Redirects in UriComponentsBuilder. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Phising-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2024-06-06T22:00:00Z", "title": "CVE-2024-22243" }, { "cve": "CVE-2024-22259", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese Fehler betreffen das VMware Tanzu Spring Framework aufgrund eines offenen Redirects in UriComponentsBuilder. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Phising-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2024-06-06T22:00:00Z", "title": "CVE-2024-22259" }, { "cve": "CVE-2024-22262", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese Fehler betreffen das VMware Tanzu Spring Framework aufgrund eines offenen Redirects in UriComponentsBuilder. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Phising-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2024-06-06T22:00:00Z", "title": "CVE-2024-22262" }, { "cve": "CVE-2023-40546", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen in den Komponenten ISC BIND und rhboot shim. Diese bestehen aufgrund unsachgem\u00e4\u00dfem Parsing, Fehlern bei der Antwortverarbeitung, einer NULL-Zeiger-Dereferenz und einem Out-of-Bounds-Read-Fehler. Ein entfernter, anonymer oder ein lokaler, privilegierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen." } ], "release_date": "2024-06-06T22:00:00Z", "title": "CVE-2023-40546" }, { "cve": "CVE-2023-40549", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen in den Komponenten ISC BIND und rhboot shim. Diese bestehen aufgrund unsachgem\u00e4\u00dfem Parsing, Fehlern bei der Antwortverarbeitung, einer NULL-Zeiger-Dereferenz und einem Out-of-Bounds-Read-Fehler. Ein entfernter, anonymer oder ein lokaler, privilegierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen." } ], "release_date": "2024-06-06T22:00:00Z", "title": "CVE-2023-40549" }, { "cve": "CVE-2023-40551", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen in den Komponenten ISC BIND und rhboot shim. Diese bestehen aufgrund unsachgem\u00e4\u00dfem Parsing, Fehlern bei der Antwortverarbeitung, einer NULL-Zeiger-Dereferenz und einem Out-of-Bounds-Read-Fehler. Ein entfernter, anonymer oder ein lokaler, privilegierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen." } ], "release_date": "2024-06-06T22:00:00Z", "title": "CVE-2023-40551" }, { "cve": "CVE-2023-4408", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen in den Komponenten ISC BIND und rhboot shim. Diese bestehen aufgrund unsachgem\u00e4\u00dfem Parsing, Fehlern bei der Antwortverarbeitung, einer NULL-Zeiger-Dereferenz und einem Out-of-Bounds-Read-Fehler. Ein entfernter, anonymer oder ein lokaler, privilegierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen." } ], "release_date": "2024-06-06T22:00:00Z", "title": "CVE-2023-4408" }, { "cve": "CVE-2023-50387", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen in den Komponenten ISC BIND und rhboot shim. Diese bestehen aufgrund unsachgem\u00e4\u00dfem Parsing, Fehlern bei der Antwortverarbeitung, einer NULL-Zeiger-Dereferenz und einem Out-of-Bounds-Read-Fehler. Ein entfernter, anonymer oder ein lokaler, privilegierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen." } ], "release_date": "2024-06-06T22:00:00Z", "title": "CVE-2023-50387" }, { "cve": "CVE-2023-50868", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen in den Komponenten ISC BIND und rhboot shim. Diese bestehen aufgrund unsachgem\u00e4\u00dfem Parsing, Fehlern bei der Antwortverarbeitung, einer NULL-Zeiger-Dereferenz und einem Out-of-Bounds-Read-Fehler. Ein entfernter, anonymer oder ein lokaler, privilegierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen." } ], "release_date": "2024-06-06T22:00:00Z", "title": "CVE-2023-50868" }, { "cve": "CVE-2023-40547", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese Fehler bestehen in rhboot-Shim aufgrund eines Out-of-Bounds-Write und eines Heap-basierten Puffer\u00fcberlaufs. Ein Angreifer aus einem angrenzenden Netzwerk oder ein lokaler Angreifer kann diese Schwachstellen zur Ausf\u00fchrung von beliebigem Code ausnutzen." } ], "release_date": "2024-06-06T22:00:00Z", "title": "CVE-2023-40547" }, { "cve": "CVE-2023-40548", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese Fehler bestehen in rhboot-Shim aufgrund eines Out-of-Bounds-Write und eines Heap-basierten Puffer\u00fcberlaufs. Ein Angreifer aus einem angrenzenden Netzwerk oder ein lokaler Angreifer kann diese Schwachstellen zur Ausf\u00fchrung von beliebigem Code ausnutzen." } ], "release_date": "2024-06-06T22:00:00Z", "title": "CVE-2023-40548" }, { "cve": "CVE-2023-40550", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese Fehler besteht in rhboot-Shim aufgrund eines Out-of-Bound-Lesefehlers in der Funktion verify_buffer_sbat(). Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um vertrauliche Informationen offenzulegen." } ], "release_date": "2024-06-06T22:00:00Z", "title": "CVE-2023-40550" }, { "cve": "CVE-2023-3758", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen in der SSSD-Komponente. Die GPO-Richtlinie f\u00fcr authentifizierte Benutzer wird nicht konsistent angewendet. Ein Angreifer aus einem angrenzenden Netzwerk kann diese Schwachstelle ausnutzen, um Sicherheitsma\u00dfnahmen bzgl. Autorisierung zu umgehen." } ], "release_date": "2024-06-06T22:00:00Z", "title": "CVE-2023-3758" } ] }
gsd-2023-40548
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2023-40548", "id": "GSD-2023-40548" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2023-40548" ], "details": "A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.", "id": "GSD-2023-40548", "modified": "2023-12-13T01:20:43.595300Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2023-40548", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Red Hat Enterprise Linux 7", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-3.el7", "versionType": "rpm" } ] } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-1.el7", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 8", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-4.el8_9", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 8.2 Advanced Update Support", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el8_2", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 8.2 Telecommunications Update Service", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el8_2", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el8_2", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el8_4", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 8.4 Telecommunications Update Service", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el8_4", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el8_4", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 8.8 Extended Update Support", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el8", "versionType": "rpm" } ] } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el8", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 9", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-4.el9_3", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-3.el9", "versionType": "rpm" } ] } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el9", "versionType": "rpm" } ] } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-2.el9", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 9.2 Extended Update Support", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:15.8-3.el9_2", "versionType": "rpm" } ] } } ] } } ] }, "vendor_name": "Red Hat" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase." } ] }, "impact": { "cvss": [ { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-787", "lang": "eng", "value": "Out-of-bounds Write" } ] } ] }, "references": { "reference_data": [ { "name": "https://access.redhat.com/errata/RHSA-2024:1834", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:1834" }, { "name": "https://access.redhat.com/errata/RHSA-2024:1835", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:1835" }, { "name": "https://access.redhat.com/errata/RHSA-2024:1873", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:1873" }, { "name": "https://access.redhat.com/errata/RHSA-2024:1876", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:1876" }, { "name": "https://access.redhat.com/errata/RHSA-2024:1883", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:1883" }, { "name": "https://access.redhat.com/errata/RHSA-2024:1902", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:1902" }, { "name": "https://access.redhat.com/errata/RHSA-2024:1903", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:1903" }, { "name": "https://access.redhat.com/errata/RHSA-2024:1959", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:1959" }, { "name": "https://access.redhat.com/security/cve/CVE-2023-40548", "refsource": "MISC", "url": "https://access.redhat.com/security/cve/CVE-2023-40548" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782" } ] }, "work_around": [ { "lang": "en", "value": "There\u0027s no available mitigation for this issue." } ] }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:shim:*:*:*:*:*:*:*:*", "matchCriteriaId": "01639865-3664-4034-BCFB-F4E09AF37F28", "versionEndExcluding": "15.8", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:shim:15.8:rc1:*:*:*:*:*:*", "matchCriteriaId": "BF11AEF9-B742-46DC-94D2-6160B93767BD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase." }, { "lang": "es", "value": "Se encontr\u00f3 un desbordamiento de b\u00fafer en Shim en el sistema de 32 bits. El desbordamiento ocurre debido a una operaci\u00f3n de suma que involucra un valor controlado por el usuario analizado del binario PE que utiliza Shim. Este valor se utiliza adem\u00e1s para operaciones de asignaci\u00f3n de memoria, lo que provoca un desbordamiento de b\u00fafer en la regi\u00f3n Heap de la memoria. Esta falla causa da\u00f1os en la memoria y puede provocar fallas o problemas de integridad de los datos durante la fase de inicio." } ], "id": "CVE-2023-40548", "lastModified": "2024-04-25T14:15:08.587", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.4, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "exploitabilityScore": 1.4, "impactScore": 4.7, "source": "secalert@redhat.com", "type": "Secondary" } ] }, "published": "2024-01-29T15:15:08.893", "references": [ { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:1834" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:1835" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:1873" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:1876" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:1883" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:1902" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:1903" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:1959" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2023-40548" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "secalert@redhat.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-190" }, { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Secondary" } ] } } } }
ghsa-7cf2-63mg-hv4j
Vulnerability from github
Published
2024-01-29 15:30
Modified
2024-06-10 18:30
Severity ?
Details
A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.
{ "affected": [], "aliases": [ "CVE-2023-40548" ], "database_specific": { "cwe_ids": [ "CWE-122", "CWE-190", "CWE-787" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-01-29T15:15:08Z", "severity": "MODERATE" }, "details": "A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.", "id": "GHSA-7cf2-63mg-hv4j", "modified": "2024-06-10T18:30:52Z", "published": "2024-01-29T15:30:29Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40548" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:1834" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:1835" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:1873" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:1876" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:1883" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:1902" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:1903" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:1959" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:2086" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2023-40548" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241782" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "type": "CVSS_V3" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.