Buffer overflow in 32-bit Shim, causing memory corruption and potential crash
Reporter | Title | Published | Views | Family All 88 |
---|---|---|---|---|
RedhatCVE | CVE-2023-40548 | 25 Jan 202417:18 | – | redhatcve |
CBLMariner | CVE-2023-40548 affecting package shim-unsigned-aarch64 for versions less than 15.8-5 | 6 Dec 202416:02 | – | cbl_mariner |
CBLMariner | CVE-2023-40548 affecting package shim-unsigned-x64 for versions less than 15.8-5 | 6 Dec 202415:52 | – | cbl_mariner |
CBLMariner | CVE-2023-40548 affecting package shim-unsigned-x64 for versions less than 15.8-1 | 3 Sep 202411:12 | – | cbl_mariner |
CBLMariner | CVE-2023-40548 affecting package shim for versions less than 15.8-1 | 3 Sep 202411:12 | – | cbl_mariner |
CBLMariner | CVE-2023-40548 affecting package shim for versions less than 15.8-5 | 6 Dec 202415:52 | – | cbl_mariner |
Cvelist | CVE-2023-40548 Shim: interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems | 29 Jan 202414:53 | – | cvelist |
OSV | CVE-2023-40548 | 29 Jan 202415:15 | – | osv |
OSV | Red Hat Security Advisory: shim security update | 1 Oct 202413:44 | – | osv |
OSV | Important: shim bug fix update | 18 Apr 202400:00 | – | osv |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo