First published: Thu May 26 2022(Updated: )
There's a possible overflow in handle_image() when shim tries to load and execute crafted EFI executables; The handle_image() function takes into account the SizeOfRawData field from each section to be loaded. An attacker can leverage this to perform out-of-bound writes into memory. Arbitrary code execution is not discarded in such scenario.
Credit: security@ubuntu.com security@ubuntu.com security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/shim | <0:15.6-1.el8 | 0:15.6-1.el8 |
redhat/shim-unsigned-x64 | <0:15.6-1.el8 | 0:15.6-1.el8 |
redhat/shim | <0:15.6-1.el9 | 0:15.6-1.el9 |
redhat/shim-unsigned-x64 | <0:15.6-1.el9 | 0:15.6-1.el9 |
ubuntu/shim | <15.6 | 15.6 |
Redhat Shim | <15.6 | |
debian/shim | <=15.4-7~deb10u1 | 15.7-1~deb10u1 15.7-1~deb11u1 15.7-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-28737 is a vulnerability in shim that allows an attacker to perform out-of-bounds writes into memory by leveraging a crafted EFI image.
The severity of CVE-2022-28737 is high with a CVSS score of 7.8.
The Red Hat Shim package versions up to 15.6, Red Hat Shim Unsigned x64 package versions up to 15.6, Red Hat Shim package versions up to 15.6 on el8, Red Hat Shim Unsigned x64 package versions up to 15.6 on el8, Red Hat Shim package versions up to 15.6 on el9, Red Hat Shim Unsigned x64 package versions up to 15.6 on el9, Ubuntu Shim package versions up to 15.6, and Debian Shim package versions up to 15.4-7~deb10u1 are affected by CVE-2022-28737.
An attacker can exploit CVE-2022-28737 by using a crafted EFI image to perform out-of-bounds writes into memory.
Yes, the remedy for CVE-2022-28737 is to update to Red Hat Shim package version 15.6 or later, Red Hat Shim Unsigned x64 package version 15.6 or later, Ubuntu Shim package version 15.6 or later, or Debian Shim package version 15.7-1~deb10u1 or later.