OESA-2024-1186

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1186
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2024-1186.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2024-1186
Upstream
Published
2024-02-23T11:07:01Z
Modified
2025-08-12T05:16:58.005051Z
Summary
shim security update
Details

Initial UEFI bootloader that handles chaining to a trusted full \ bootloader under secure boot environments.

Security Fix(es):

A security vulnerability has been identified in all supported versions

of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems.

Policy processing is disabled by default but can be enabled by passing the -policy' argument to the command line utilities or by calling the X509VERIFYPARAMset1policies()' function.(CVE-2023-0464)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:22.03-LTS / shim

Package

Name
shim
Purl
pkg:rpm/openEuler/shim&distro=openEuler-22.03-LTS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
15.4-13.oe2203

Ecosystem specific

{
    "x86_64": [
        "shim-15.4-13.oe2203.x86_64.rpm"
    ],
    "aarch64": [
        "shim-15.4-13.oe2203.aarch64.rpm"
    ],
    "src": [
        "shim-15.4-13.oe2203.src.rpm"
    ],
    "noarch": [
        "shim-debuginfo-15.4-13.oe2203.noarch.rpm",
        "shim-debugsource-15.4-13.oe2203.noarch.rpm"
    ]
}