Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.856097
Category:openSUSE Local Security Checks
Title:openSUSE Security Advisory (SUSE-SU-2024:1368-1)
Summary:The remote host is missing an update for the 'shim' package(s) announced via the SUSE-SU-2024:1368-1 advisory.
Description:Summary:
The remote host is missing an update for the 'shim' package(s) announced via the SUSE-SU-2024:1368-1 advisory.

Vulnerability Insight:
This update for shim fixes the following issues:

- Update shim-install to set the TPM2 SRK algorithm (bsc#1213945)
- Limit the requirement of fde-tpm-helper-macros to the distro with
suse_version 1600 and above (bsc#1219460)

Update to version 15.8:

Security issues fixed:

- mok: fix LogError() invocation (bsc#1215099,CVE-2023-40546)
- avoid incorrectly trusting HTTP headers (bsc#1215098,CVE-2023-40547)
- Fix integer overflow on SBAT section size on 32-bit system (bsc#1215100,CVE-2023-40548)
- Authenticode: verify that the signature header is in bounds (bsc#1215101,CVE-2023-40549)
- pe: Fix an out-of-bound read in verify_buffer_sbat() (bsc#1215102,CVE-2023-40550)
- pe-relocate: Fix bounds check for MZ binaries (bsc#1215103,CVE-2023-40551)


The NX flag is disable which is same as the default value of shim-15.8, hence, not need to enable it by this patch now.

- Generate dbx during build so we don't include binary files in sources
- Don't require grub so shim can still be used with systemd-boot
- Update shim-install to fix boot failure of ext4 root file system
on RAID10 (bsc#1205855)
- Adopt the macros from fde-tpm-helper-macros to update the
signature in the sealed key after a bootloader upgrade

- Update shim-install to amend full disk encryption support
- Adopt TPM 2.0 Key File for grub2 TPM 2.0 protector
- Use the long name to specify the grub2 key protector
- cryptodisk: support TPM authorized policies
- Do not use tpm_record_pcrs unless the command is in command.lst

- Removed POST_PROCESS_PE_FLAGS=-N from the build command in shim.spec to
enable the NX compatibility flag when using post-process-pe after
discussed with grub2 experts in mail. It's useful for further development
and testing. (bsc#1205588)

Affected Software/OS:
'shim' package(s) on openSUSE Leap 15.5.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:A/AC:H/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2022-28737
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28737
https://www.openwall.com/lists/oss-security/2022/06/07/5
Common Vulnerability Exposure (CVE) ID: CVE-2023-40546
RHBZ#2241796
https://bugzilla.redhat.com/show_bug.cgi?id=2241796
RHSA-2024:1834
https://access.redhat.com/errata/RHSA-2024:1834
RHSA-2024:1835
https://access.redhat.com/errata/RHSA-2024:1835
RHSA-2024:1873
https://access.redhat.com/errata/RHSA-2024:1873
RHSA-2024:1876
https://access.redhat.com/errata/RHSA-2024:1876
RHSA-2024:1883
https://access.redhat.com/errata/RHSA-2024:1883
RHSA-2024:1902
https://access.redhat.com/errata/RHSA-2024:1902
RHSA-2024:1903
https://access.redhat.com/errata/RHSA-2024:1903
RHSA-2024:1959
https://access.redhat.com/errata/RHSA-2024:1959
RHSA-2024:2086
https://access.redhat.com/errata/RHSA-2024:2086
https://access.redhat.com/security/cve/CVE-2023-40546
https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-40547
RHBZ#2234589
https://bugzilla.redhat.com/show_bug.cgi?id=2234589
http://www.openwall.com/lists/oss-security/2024/01/26/1
https://access.redhat.com/security/cve/CVE-2023-40547
Common Vulnerability Exposure (CVE) ID: CVE-2023-40548
RHBZ#2241782
https://bugzilla.redhat.com/show_bug.cgi?id=2241782
https://access.redhat.com/security/cve/CVE-2023-40548
Common Vulnerability Exposure (CVE) ID: CVE-2023-40549
RHBZ#2241797
https://bugzilla.redhat.com/show_bug.cgi?id=2241797
https://access.redhat.com/security/cve/CVE-2023-40549
Common Vulnerability Exposure (CVE) ID: CVE-2023-40550
RHBZ#2259915
https://bugzilla.redhat.com/show_bug.cgi?id=2259915
https://access.redhat.com/security/cve/CVE-2023-40550
Common Vulnerability Exposure (CVE) ID: CVE-2023-40551
RHBZ#2259918
https://bugzilla.redhat.com/show_bug.cgi?id=2259918
https://access.redhat.com/security/cve/CVE-2023-40551
CopyrightCopyright (C) 2024 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.