DEBIAN-CVE-2023-40548

Source
https://security-tracker.debian.org/tracker/CVE-2023-40548
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2023-40548.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2023-40548
Upstream
Published
2024-01-29T15:15:08Z
Modified
2025-09-30T05:16:09.266695Z
Summary
[none]
Details

A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.

References

Affected packages

Debian:11 / shim

Package

Name
shim
Purl
pkg:deb/debian/shim?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
15.8-1~deb11u1

Affected versions

15.*

15.4-7
15.6-1~deb10u1
15.6-1~deb11u1
15.6-1
15.7-1~deb10u1
15.7-1~deb11u1
15.7-1
15.8-1~deb10u1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / shim

Package

Name
shim
Purl
pkg:deb/debian/shim?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
15.8-1~deb12u1

Affected versions

15.*

15.7-1
15.8-1~deb10u1
15.8-1~deb11u1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / shim

Package

Name
shim
Purl
pkg:deb/debian/shim?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
15.8-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / shim

Package

Name
shim
Purl
pkg:deb/debian/shim?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
15.8-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}