An update for shim is now available for openEuler-20.03-LTS-SP1
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2024-1185
Final
1.0
1.0
2024-02-23
Initial
2024-02-23
2024-02-23
openEuler SA Tool V1.0
2024-02-23
shim security update
An update for shim is now available for openEuler-20.03-LTS-SP1.
Initial UEFI bootloader that handles chaining to a trusted full \ bootloader under secure boot environments.
Security Fix(es):
A security vulnerability has been identified in all supported versions
of OpenSSL related to the verification of X.509 certificate chains
that include policy constraints. Attackers may be able to exploit this
vulnerability by creating a malicious certificate chain that triggers
exponential use of computational resources, leading to a denial-of-service
(DoS) attack on affected systems.
Policy processing is disabled by default but can be enabled by passing
the `-policy' argument to the command line utilities or by calling the
`X509_VERIFY_PARAM_set1_policies()' function.(CVE-2023-0464)
An update for shim is now available for openEuler-20.03-LTS-SP1.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
High
shim
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1185
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-0464
https://nvd.nist.gov/vuln/detail/CVE-2023-0464
openEuler-20.03-LTS-SP1
shim-15-28.oe1.aarch64.rpm
shim-debugsource-15-28.oe1.noarch.rpm
shim-debuginfo-15-28.oe1.noarch.rpm
shim-15-28.oe1.src.rpm
shim-15-28.oe1.x86_64.rpm
A security vulnerability has been identified in all supported versions
of OpenSSL related to the verification of X.509 certificate chains
that include policy constraints. Attackers may be able to exploit this
vulnerability by creating a malicious certificate chain that triggers
exponential use of computational resources, leading to a denial-of-service
(DoS) attack on affected systems.
Policy processing is disabled by default but can be enabled by passing
the `-policy' argument to the command line utilities or by calling the
`X509_VERIFY_PARAM_set1_policies()' function.
2024-02-23
CVE-2023-0464
openEuler-20.03-LTS-SP1
High
7.5
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
shim security update
2024-02-23
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1185