CVE-2023-40548

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-40548
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-40548.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-40548
Downstream
Related
Published
2024-01-29T15:15:08Z
Modified
2025-10-16T10:07:29.559146Z
Severity
  • 7.4 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.

References

Affected packages

Git / github.com/rhboot/shim

Affected ranges

Type
GIT
Repo
https://github.com/rhboot/shim
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.3
0.4
0.5
0.7
0.8
0.9

Other

11
12
13
14
15

15.*

15.2
15.3
15.4
15.5
15.5-rc2
15.6
15.6-rc2
15.7

shim-15.*

shim-15.3-rc1
shim-15.3-rc2
shim-15.3-rc3
shim-15.3-rc4