A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.
References
Configurations
History
06 Sep 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Jun 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
29 Apr 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Apr 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
18 Apr 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
16 Apr 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
19 Feb 2024, 11:15
Type | Values Removed | Values Added |
---|---|---|
CWE |
06 Feb 2024, 18:37
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-787 CWE-190 |
|
References | () https://access.redhat.com/security/cve/CVE-2023-40548 - Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2241782 - Issue Tracking, Vendor Advisory | |
CPE | cpe:2.3:a:redhat:shim:*:*:*:*:*:*:*:* cpe:2.3:a:redhat:shim:15.8:rc1:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* |
|
First Time |
Redhat
Fedoraproject Redhat shim Fedoraproject fedora |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.4 |
29 Jan 2024, 16:19
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-29 15:15
Updated : 2024-09-10 08:15
NVD link : CVE-2023-40548
Mitre link : CVE-2023-40548
CVE.ORG link : CVE-2023-40548
JSON object : View
Products Affected
redhat
- shim
fedoraproject
- fedora