A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.
References
Configurations
History
10 Jun 2024, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
29 Apr 2024, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
25 Apr 2024, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
18 Apr 2024, 04:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
16 Apr 2024, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
19 Feb 2024, 11:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE |
06 Feb 2024, 18:37
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-190 CWE-787 |
|
| Summary |
|
|
| First Time |
Fedoraproject fedora
Redhat Redhat shim Fedoraproject |
|
| References | () https://access.redhat.com/security/cve/CVE-2023-40548 - Vendor Advisory | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2241782 - Issue Tracking, Vendor Advisory | |
| CPE | cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* cpe:2.3:a:redhat:shim:15.8:rc1:*:*:*:*:*:* cpe:2.3:a:redhat:shim:*:*:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.4 |
29 Jan 2024, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-01-29 15:15
Updated : 2024-06-10 18:15
NVD link : CVE-2023-40548
Mitre link : CVE-2023-40548
CVE.ORG link : CVE-2023-40548
JSON object : View
Products Affected
fedoraproject
- fedora
redhat
- shim
