Уязвимость CVE-2023-40547: Информация
Описание
A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.
Важность: HIGH (8,3) Вектор: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Исправленные пакеты
Имя пакета | Ветка | Исправлено в версии | Версия в репозитории | Errata ID | № Задания | Состояние |
---|---|---|---|---|---|---|
shim | sisyphus | 15.8-alt1 | 15.8-alt1 | ALT-PU-2024-1671-2 | 339548 | Исправлено |
shim | p10 | 15.8-alt1 | 15.8-alt1 | ALT-PU-2024-1877-3 | 339915 | Исправлено |
shim | c10f1 | 15.8-alt1 | 15.8-alt1 | ALT-PU-2024-4050-2 | 342790 | Исправлено |
shim | c9f2 | 15.8-alt1 | 15.8-alt1 | ALT-PU-2024-1869-3 | 339892 | Исправлено |
Ссылки на рекомендации, решения и инструменты
Ссылка | Ресурс |
---|---|
https://access.redhat.com/security/cve/CVE-2023-40547 |
|
RHBZ#2234589 |
|
http://www.openwall.com/lists/oss-security/2024/01/26/1 |
|
RHSA-2024:1834 | |
RHSA-2024:1835 | |
RHSA-2024:1873 | |
RHSA-2024:1876 | |
RHSA-2024:1883 | |
RHSA-2024:1902 | |
RHSA-2024:1903 | |
RHSA-2024:1959 |