An out-of-bounds read flaw was found in Shim due to the lack of proper boundary verification during the load of a PE binary. This flaw allows an attacker to load a crafted PE binary, triggering the issue and crashing Shim, resulting in a denial of service.
Workaround:
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2024:1834 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:1835 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:1873 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:1876 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:1883 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:1902 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:1903 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:1959 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:2086 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2023-40549 | vdb entry vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2241797 | vendor advisory issue tracking |
https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html |