Bug 2234589 (CVE-2023-40547)
Summary: | CVE-2023-40547 shim: RCE in http boot support may lead to Secure Boot bypass | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Marco Benatto <mbenatto> |
Component: | vulnerability | Assignee: | Product Security <prodsec-ir-bot> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | chaekim, cylopez, dbodnarc, dornelas, gcovolo, jgamba, jmcdonald, kyoshida, mlewando, pasik, pdwyer, prodsec-ir-bot, sbalasub, security-response-team, torrent-santiago, troels |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | shim 15.8 | Doc Type: | If docs needed, set a value |
Doc Text: |
A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2024-04-18 07:24:34 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2259914 | ||
Bug Blocks: | 2234588 |
Description
Marco Benatto
2023-08-24 19:13:52 UTC
Created shim tracking bugs for this issue: Affects: fedora-all [bug 2259914] reproduced using shim-15.6-3.el7_9 verified using shim 15.8-1.el7: CVE is mitigated Sanity testing passed: efi binary signatures, booting VM, netboot / httpboot all work with new shim Important update information: The new shim revokes ALL PREVIOUS VERSIONS of GRUB2. Therefore GRUB2 MUST be updated to the latest version: grub2-2.02-0.87.el7_9.14 (RHSA-2024:128440-02) BEFORE OR SIMULTANEOUSLY with this shim in order for Secure Boot to continue to work. Failure to update GRUB2 will result in an UNBOOTABLE system. This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions Red Hat Enterprise Linux 8.2 Telecommunications Update Service Via RHSA-2024:1834 https://access.redhat.com/errata/RHSA-2024:1834 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2024:1835 https://access.redhat.com/errata/RHSA-2024:1835 all shim builds were tested against CVE reproducer as well as sanity tests: signatures on efi binaries, VM booting with SB disabled/enabled, http/netboot shim-15.8-3 (fc) shim-15.8-1.el7 shim-15.8-2.el8 shim-15.8-2.el8_1 shim-15.8-2.el8_2 shim-15.8-2.el8_4 shim-15.8-2.el8_6 shim-15.8-4.el8_9 shim-15.8-2.el8_10 shim-15.8-2.el9 shim-15.8-3.el9 shim-15.8-3.el9_2 shim-15.8-4.el9_3 shim-15.8-3.el9_4 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Red Hat Enterprise Linux 8.4 Telecommunications Update Service Via RHSA-2024:1873 https://access.redhat.com/errata/RHSA-2024:1873 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:1876 https://access.redhat.com/errata/RHSA-2024:1876 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Via RHSA-2024:1883 https://access.redhat.com/errata/RHSA-2024:1883 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:1903 https://access.redhat.com/errata/RHSA-2024:1903 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:1902 https://access.redhat.com/errata/RHSA-2024:1902 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2024:1959 https://access.redhat.com/errata/RHSA-2024:1959 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2024:2086 https://access.redhat.com/errata/RHSA-2024:2086 |