Shim: interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems
CVE-2023-40548
Key Information:
- Vendor
- Red Hat
- Status
- Vendor
- CVE Published:
- 29 January 2024
Summary
A buffer overflow vulnerability exists in the Shim component of the 32-bit system environment. It arises from an addition operation that involves user-controlled values parsed from Portable Executable (PE) binaries used by Shim. This maliciously manipulated value is leveraged during memory allocation processes, which can lead to heap-based buffer overflow conditions. The potential consequences of this flaw include memory corruption that may result in system crashes or impact data integrity during crucial boot sequences. Rigorous attention to the associated advisories is recommended for users utilizing affected Shim versions.
Affected Version(s)
Red Hat Enterprise Linux 7 0:15.8-3.el7
Red Hat Enterprise Linux 7 0:15.8-1.el7
Red Hat Enterprise Linux 8 0:15.8-4.el8_9
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved