CVE-2023-40548

A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:shim:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:shim:15.8:rc1:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*

History

21 Nov 2024, 08:19

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html -
References () https://access.redhat.com/errata/RHSA-2024:1834 - () https://access.redhat.com/errata/RHSA-2024:1834 -
References () https://access.redhat.com/errata/RHSA-2024:1835 - () https://access.redhat.com/errata/RHSA-2024:1835 -
References () https://access.redhat.com/errata/RHSA-2024:1873 - () https://access.redhat.com/errata/RHSA-2024:1873 -
References () https://access.redhat.com/errata/RHSA-2024:1876 - () https://access.redhat.com/errata/RHSA-2024:1876 -
References () https://access.redhat.com/errata/RHSA-2024:1883 - () https://access.redhat.com/errata/RHSA-2024:1883 -
References () https://access.redhat.com/errata/RHSA-2024:1902 - () https://access.redhat.com/errata/RHSA-2024:1902 -
References () https://access.redhat.com/errata/RHSA-2024:1903 - () https://access.redhat.com/errata/RHSA-2024:1903 -
References () https://access.redhat.com/errata/RHSA-2024:1959 - () https://access.redhat.com/errata/RHSA-2024:1959 -
References () https://access.redhat.com/errata/RHSA-2024:2086 - () https://access.redhat.com/errata/RHSA-2024:2086 -
References () https://access.redhat.com/security/cve/CVE-2023-40548 - Vendor Advisory () https://access.redhat.com/security/cve/CVE-2023-40548 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2241782 - Issue Tracking, Vendor Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=2241782 - Issue Tracking, Vendor Advisory

06 Sep 2024, 18:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html', 'source': 'secalert@redhat.com'}

10 Jun 2024, 18:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html -

29 Apr 2024, 14:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:2086 -

25 Apr 2024, 14:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:1902 -
  • () https://access.redhat.com/errata/RHSA-2024:1903 -
  • () https://access.redhat.com/errata/RHSA-2024:1959 -

18 Apr 2024, 04:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:1873 -
  • () https://access.redhat.com/errata/RHSA-2024:1876 -
  • () https://access.redhat.com/errata/RHSA-2024:1883 -

16 Apr 2024, 16:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:1834 -
  • () https://access.redhat.com/errata/RHSA-2024:1835 -

19 Feb 2024, 11:15

Type Values Removed Values Added
CWE CWE-787

06 Feb 2024, 18:37

Type Values Removed Values Added
CPE cpe:2.3:a:redhat:shim:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:shim:15.8:rc1:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
First Time Redhat
Fedoraproject
Redhat shim
Fedoraproject fedora
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.4
CWE CWE-787
CWE-190
References () https://access.redhat.com/security/cve/CVE-2023-40548 - () https://access.redhat.com/security/cve/CVE-2023-40548 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2241782 - () https://bugzilla.redhat.com/show_bug.cgi?id=2241782 - Issue Tracking, Vendor Advisory

29 Jan 2024, 16:19

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-29 15:15

Updated : 2024-11-21 08:19


NVD link : CVE-2023-40548

Mitre link : CVE-2023-40548

CVE.ORG link : CVE-2023-40548


JSON object : View

Products Affected

fedoraproject

  • fedora

redhat

  • shim
CWE
CWE-787

Out-of-bounds Write

CWE-190

Integer Overflow or Wraparound