CVE-2023-40548

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-40548
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-40548.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-40548
Downstream
Related
Published
2024-01-29T15:15:08Z
Modified
2025-10-10T04:36:33.357504Z
Summary
[none]
Details

A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.

References

Affected packages

Git / github.com/rhboot/shim

Affected ranges

Type
GIT
Repo
https://github.com/rhboot/shim
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.3
0.4
0.5
0.7
0.8
0.9

Other

11
12
13
14
15

15.*

15.2
15.3
15.4
15.5
15.5-rc2
15.6
15.6-rc2
15.7

shim-15.*

shim-15.3-rc1
shim-15.3-rc2
shim-15.3-rc3
shim-15.3-rc4