7.4 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
8.1 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
28.0%
A buffer overflow was found in Shim in the 32-bit system. The overflow
happens due to an addition operation involving a user-controlled value
parsed from the PE binary being used by Shim. This value is further used
for memory allocation operations, leading to a heap-based buffer overflow.
This flaw causes memory corruption and can lead to a crash or data
integrity issues during the boot phase.
Author | Note |
---|---|
eslerm | UEFI Security Response Team states that dbx update is not needed secureboot-db should only ever be updated after shim secureboot-db is not updated on ESM releases as doing so would revoke install media keys Note that key revocation is required to protect against evil housekeeper attacks (such as BlackLotus) |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | shim | < any | UNKNOWN |
ubuntu | 20.04 | noarch | shim | < any | UNKNOWN |
ubuntu | 22.04 | noarch | shim | < any | UNKNOWN |
ubuntu | 23.10 | noarch | shim | < any | UNKNOWN |
ubuntu | 24.04 | noarch | shim | < 15.8-0ubuntu1 | UNKNOWN |
ubuntu | 18.04 | noarch | shim-signed | < any | UNKNOWN |
ubuntu | 20.04 | noarch | shim-signed | < any | UNKNOWN |
ubuntu | 22.04 | noarch | shim-signed | < any | UNKNOWN |
ubuntu | 23.10 | noarch | shim-signed | < any | UNKNOWN |
ubuntu | 24.04 | noarch | shim-signed | < 15.8 | UNKNOWN |
7.4 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
8.1 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
28.0%