• Bug#1061519: shim: CVE-2023-40546 CVE-2023-40547 CVE-2023-40548 CVE-202

    From Salvatore Bonaccorso@21:1/5 to All on Thu Jan 25 22:00:01 2024
    Source: shim
    Version: 15.7-1
    Severity: grave
    Tags: security upstream
    X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>
    Control: found -1 15.7-1~deb11u1

    Hi,

    The following vulnerabilities were published for shim.

    According to [6]:

    * Various CVE fixes:
    CVE-2023-40546 mok: fix LogError() invocation
    CVE-2023-40547 - avoid incorrectly trusting HTTP headers
    CVE-2023-40548 Fix integer overflow on SBAT section size on 32-bit system
    CVE-2023-40549 Authenticode: verify that the signature header is in bounds.
    CVE-2023-40550 pe: Fix an out-of-bound read in verify_buffer_sbat()
    CVE-2023-40551: pe-relocate: Fix bounds check for MZ binaries

    If you fix the vulnerabilities please also make sure to include the
    CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

    For further information see:

    [0] https://security-tracker.debian.org/tracker/CVE-2023-40546
    https://www.cve.org/CVERecord?id=CVE-2023-40546
    [1] https://security-tracker.debian.org/tracker/CVE-2023-40547
    https://www.cve.org/CVERecord?id=CVE-2023-40547
    [2] https://security-tracker.debian.org/tracker/CVE-2023-40548
    https://www.cve.org/CVERecord?id=CVE-2023-40548
    [3] https://security-tracker.debian.org/tracker/CVE-2023-40549
    https://www.cve.org/CVERecord?id=CVE-2023-40549
    [4] https://security-tracker.debian.org/tracker/CVE-2023-40550
    https://www.cve.org/CVERecord?id=CVE-2023-40550
    [5] https://security-tracker.debian.org/tracker/CVE-2023-40551
    https://www.cve.org/CVERecord?id=CVE-2023-40551
    [6] https://github.com/rhboot/shim/releases/tag/15.8

    Regards,
    Salvatore

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?UTF-8?Q?Martin-=C3=89ric?= Racine@21:1/5 to All on Sun Feb 11 07:30:01 2024
    Package: shim
    Followup-For: Bug #1061519

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA512

    shim 15.8 @vathpela vathpela released this 23 Jan 19:01

    What's New

    * Various CVE fixes:
    CVE-2023-40546 mok: fix LogError() invocation
    CVE-2023-40547 - avoid incorrectly trusting HTTP headers
    CVE-2023-40548 Fix integer overflow on SBAT section size on 32-bit system
    CVE-2023-40549 Authenticode: verify that the signature header is in bounds.
    CVE-2023-40550 pe: Fix an out-of-bound read in verify_buffer_sbat()
    CVE-2023-40551: pe-relocate: Fix bounds check for MZ binaries

    -----BEGIN PGP SIGNATURE-----

    iQIzBAEBCgAdFiEEyJACx3qL7GpObXOQrh+Cd8S017YFAmXIZ50ACgkQrh+Cd8S0 17ZHWhAAge996R8VG8WR1eoqM13HYsAvDh/ITPOHEAInuAvxnxW2f77RQuAdh/lL SK0++9aR6P2yQu1j+JjfRz7vBt4FQ1j08RkjYj3kpKq8nHdA6C0fg1OvqXKs5+lc 44noX5AfKGyYDu/EhNkmAdFmE98sRVRqLlu8Ilfg1r8/voYFLOeyplW1T5Pk9xqW Uv+wvLFNyj5mxMakPRyuZWD0bjkw33GYHKHMG5uB1ElwKws8cS/Lh9ZjaDk0GBy+ m4v0mhsIghPCcrNSfNcxvBT7fzR0dsD/wO21rBLcJc3ExdCeA39U4+jO86TS2/39 cfJhaY5FO72F8kX5qDKsNJzvl8Bhq4gH7YtEqyZC9aYdQgSpUdAuU6RQu9zDvpZm EKuJVmXlgc+4IhgYLzJDHH2rL9gI2IctMNPwlKPI89SVs5J+Ha11t8V6oC36Chgq nWrJeWnAhgHiDoTwHwqsj2j3YAVE7lHrAcxqgN1Sl5knmO26qxf8ZgrjB3iR/lVR ufjBnkN+MJaN5oSV4XUTOlOk8uDswtQ1b6ycJAHbA+XhyHcHLRFY4bLVuDviJFsd c3HGcsjzEwepvkg5mmKBm9renLxyUkqhiXQ7JSr5nKWlkaz5DR/4t74sfPjm1qK2 jsugjusiKZG4D895vQ3QcDafL4hdpqgpfi8k4O/Xbq5ncFIjs4Y=
    =bM7B
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Debian Bug Tracking System@21:1/5 to All on Mon Apr 15 13:40:01 2024
    Processing control commands:

    tags -1 + patch
    Bug #1061519 [src:shim] shim: CVE-2023-40546 CVE-2023-40547 CVE-2023-40548 CVE-2023-40549 CVE-2023-40550 CVE-2023-40551
    Added tag(s) patch.

    --
    1061519: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061519
    Debian Bug Tracking System
    Contact owner@bugs.debian.org with problems

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Bastien =?ISO-8859-1?Q?Roucari=E8s?@21:1/5 to Debian Bug Tracking System on Mon Apr 15 11:32:58 2024
    Source: shim
    Followup-For: Bug #1061519
    Control: tags -1 + patch

    Dear Maintainer,

    Please find a MR here https://salsa.debian.org/efi-team/shim/-/merge_requests/13

    Bastien

    -----BEGIN PGP SIGNATURE-----

    iQIzBAABCgAdFiEEXQGHuUCiRbrXsPVqADoaLapBCF8FAmYdEGoACgkQADoaLapB CF8f2xAAhMVMrCcrLw1iw6HusC2bvRxcuwBBCO8EQ8uKDYBq0apuLN9IIYuVnWiU C4Kxa6ehr+9pKX5VhGbMnuNgrfECGXjsedP5tDTM7bTtSQsY8aDIp25PxcHDdyaY 5YbmGGDpbZ+B/LNfnSymDN5dLIQRP1i1lyEahdimO09vdz1do6KTPqqYRLjwMxU1 GdUVYr8hOWO3iSvJ/TY0W3KC6nlL68mb++O91FZOeLSCo1gI9lSdC7O3v/Y+3TaS dzw/aUZHAF04m8hGZjlhVg+bcZ3ylHUGCT59WTssxlZOrpfkhlefYYsGYlCe5LzV xph/KrG1lNHYGUG4IcAvqeRh5UDXeG19sisHrnvwZLE5zeYyVYICUXHiy4APkI3h NOYeqfjk5ynOHIydq/By8RaR1TtLHsrv8CkSjlwRUeS97kQMwPSKSc9yeuf/GUkr sRL+zyoLRyTYO3og6zfR0gwfP3vPWL0MwceUTVovu7MNhY5eModT02TLtiRcsGhm +MzEQX8oWW92zVduSkYwJ/C+9TEACWV+Uys58bGFeqZDN66pRhwESDuf27WDOd3F MkXBHrzszrwPJvdmXkuX1g/6mcG9TMWXA2ZoGqzJgrdI4bsCmYovLjE09M14U/nY FWAndVJTl0YZua6IeSWFZHx3zDR+zr/PLf6S+fxtEyRSII4S+6Q=
    =rxvq
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Steve McIntyre@21:1/5 to All on Mon Apr 15 16:10:01 2024
    On Mon, Apr 15, 2024 at 11:33:14AM +0000, Bastien Roucariès wrote:
    Source: shim
    Followup-For: Bug #1061519
    Control: tags -1 + patch

    Dear Maintainer,

    Please find a MR here >https://salsa.debian.org/efi-team/shim/-/merge_requests/13

    ACK. Thanks for trying to help, but the merge isn't the hard bit here.

    Tthe new upstream is a little problematic and I'm debugging some boot
    failures in my local CI already.

    --
    Steve McIntyre, Cambridge, UK. steve@einval.com Into the distance, a ribbon of black
    Stretched to the point of no turning back

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)