vulnerability
CentOS Linux: CVE-2023-40547: Important: shim security update (CESA-2024:1959)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:A/AC:M/Au:N/C:C/I:C/A:C) | 2024-01-25 | 2024-04-24 | 2025-01-28 |
Severity
8
CVSS
(AV:A/AC:M/Au:N/C:C/I:C/A:C)
Published
2024-01-25
Added
2024-04-24
Modified
2025-01-28
Description
A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.
Solution(s)
centos-upgrade-mokutilcentos-upgrade-mokutil-debuginfocentos-upgrade-shim-ia32centos-upgrade-shim-unsigned-ia32centos-upgrade-shim-unsigned-x64centos-upgrade-shim-x64
References

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.