Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-28737
HistoryJul 20, 2023 - 12:00 a.m.

CVE-2022-28737

2023-07-2000:00:00
ubuntu.com
ubuntu.com
19
possible overflow handling
handle_image() function
crafted efi executables
out-of-bound writes
arbitrary code execution.

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

23.1%

There’s a possible overflow in handle_image() when shim tries to load and
execute crafted EFI executables; The handle_image() function takes into
account the SizeOfRawData field from each section to be loaded. An attacker
can leverage this to perform out-of-bound writes into memory. Arbitrary
code execution is not discarded in such scenario.

Notes

Author Note
mdeslaur This is fixed in 15.7-0ubuntu1 that is currently in the -updates pocket of focal, jammy, and kinetic.
eslerm keys not updated on ESM releases as doing so would revoke install media keys
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchshim< anyUNKNOWN
ubuntu20.04noarchshim< 15.7-0ubuntu1UNKNOWN
ubuntu22.04noarchshim< 15.7-0ubuntu1UNKNOWN

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

23.1%