7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.001 Low
EPSS
Percentile
23.1%
There’s a possible overflow in handle_image() when shim tries to load and
execute crafted EFI executables; The handle_image() function takes into
account the SizeOfRawData field from each section to be loaded. An attacker
can leverage this to perform out-of-bound writes into memory. Arbitrary
code execution is not discarded in such scenario.
Author | Note |
---|---|
mdeslaur | This is fixed in 15.7-0ubuntu1 that is currently in the -updates pocket of focal, jammy, and kinetic. |
eslerm | keys not updated on ESM releases as doing so would revoke install media keys |