CVE-2023-40546
Shim: out-of-bounds read printing error messages
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A flaw was found in Shim when an error happened while creating a new ESL variable. If Shim fails to create the new variable, it tries to print an error message to the user; however, the number of parameters used by the logging function doesn't match the format string used by it, leading to a crash under certain circumstances.
Se encontró un fallo en Shim cuando ocurrió un error al crear una nueva variable ESL. Si Shim no puede crear la nueva variable, intenta imprimir un mensaje de error para el usuario; sin embargo, la cantidad de parámetros utilizados por la función de registro no coincide con la cadena de formato utilizada, lo que provoca un bloqueo en determinadas circunstancias.
An update for shim is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, E4S Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.4 Telecommunications Update Service. Issues addressed include buffer overflow, bypass, integer overflow, and out of bounds read vulnerabilities.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2023-08-15 CVE Reserved
- 2024-01-29 CVE Published
- 2024-11-24 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-476: NULL Pointer Dereference
CAPEC
References (12)
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2024:1834 | 2024-06-10 | |
https://access.redhat.com/errata/RHSA-2024:1835 | 2024-06-10 | |
https://access.redhat.com/errata/RHSA-2024:1873 | 2024-06-10 | |
https://access.redhat.com/errata/RHSA-2024:1876 | 2024-06-10 | |
https://access.redhat.com/errata/RHSA-2024:1883 | 2024-06-10 | |
https://access.redhat.com/errata/RHSA-2024:1902 | 2024-06-10 | |
https://access.redhat.com/errata/RHSA-2024:1903 | 2024-06-10 | |
https://access.redhat.com/errata/RHSA-2024:1959 | 2024-06-10 | |
https://access.redhat.com/errata/RHSA-2024:2086 | 2024-06-10 | |
https://access.redhat.com/security/cve/CVE-2023-40546 | 2024-04-29 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2241796 | 2024-04-29 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Redhat Search vendor "Redhat" | Shim Search vendor "Redhat" for product "Shim" | < 15.8 Search vendor "Redhat" for product "Shim" and version " < 15.8" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 39 Search vendor "Fedoraproject" for product "Fedora" and version "39" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 8.0 Search vendor "Redhat" for product "Enterprise Linux" and version "8.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 9.0 Search vendor "Redhat" for product "Enterprise Linux" and version "9.0" | - |
Affected
|