CVE-2023-40548

A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:shim:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:shim:15.8:rc1:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-01-29 15:15

Updated : 2024-06-10 18:15


NVD link : CVE-2023-40548

Mitre link : CVE-2023-40548

CVE.ORG link : CVE-2023-40548


JSON object : View

Products Affected

fedoraproject

  • fedora

redhat

  • shim
CWE
CWE-787

Out-of-bounds Write

CWE-190

Integer Overflow or Wraparound