|
|
Subscribe / Log in / New account

Scientific Linux alert SLSA-2014:1801-1 (shim)

From:  Connie Sieh <csieh@fnal.gov>
To:  <scientific-linux-errata@listserv.fnal.gov>
Subject:  Security ERRATA Moderate: shim on SL7.x x86_64
Date:  Tue, 10 Feb 2015 21:57:39 +0000
Message-ID:  <20150210215739.6327.94104@slpackages.fnal.gov>

Synopsis: Moderate: shim security update Advisory ID: SLSA-2014:1801-1 Issue Date: 2014-11-04 CVE Numbers: CVE-2014-3675 CVE-2014-3676 CVE-2014-3677 -- A heap-based buffer overflow flaw was found the way shim parsed certain IPv6 addresses. If IPv6 network booting was enabled, a malicious server could supply a crafted IPv6 address that would cause shim to crash or, potentially, execute arbitrary code. (CVE-2014-3676) An out-of-bounds memory write flaw was found in the way shim processed certain Machine Owner Keys (MOKs). A local attacker could potentially use this flaw to execute arbitrary code on the system. (CVE-2014-3677) An out-of-bounds memory read flaw was found in the way shim parsed certain IPv6 packets. A specially crafted DHCPv6 packet could possibly cause shim to crash, preventing the system from booting if IPv6 booting was enabled. (CVE-2014-3675) The system must be rebooted for this update to take effect. -- SL7 x86_64 mokutil-0.7-8.sl7_0.x86_64.rpm shim-0.7-8.sl7_0.x86_64.rpm shim-debuginfo-0.7-8.sl7_0.x86_64.rpm shim-unsigned-0.7-8.sl7_0.x86_64.rpm - Scientific Linux Development Team


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds