Scientific Linux alert SLSA-2014:1801-1 (shim)
From: | Connie Sieh <csieh@fnal.gov> | |
To: | <scientific-linux-errata@listserv.fnal.gov> | |
Subject: | Security ERRATA Moderate: shim on SL7.x x86_64 | |
Date: | Tue, 10 Feb 2015 21:57:39 +0000 | |
Message-ID: | <20150210215739.6327.94104@slpackages.fnal.gov> |
Synopsis: Moderate: shim security update Advisory ID: SLSA-2014:1801-1 Issue Date: 2014-11-04 CVE Numbers: CVE-2014-3675 CVE-2014-3676 CVE-2014-3677 -- A heap-based buffer overflow flaw was found the way shim parsed certain IPv6 addresses. If IPv6 network booting was enabled, a malicious server could supply a crafted IPv6 address that would cause shim to crash or, potentially, execute arbitrary code. (CVE-2014-3676) An out-of-bounds memory write flaw was found in the way shim processed certain Machine Owner Keys (MOKs). A local attacker could potentially use this flaw to execute arbitrary code on the system. (CVE-2014-3677) An out-of-bounds memory read flaw was found in the way shim parsed certain IPv6 packets. A specially crafted DHCPv6 packet could possibly cause shim to crash, preventing the system from booting if IPv6 booting was enabled. (CVE-2014-3675) The system must be rebooted for this update to take effect. -- SL7 x86_64 mokutil-0.7-8.sl7_0.x86_64.rpm shim-0.7-8.sl7_0.x86_64.rpm shim-debuginfo-0.7-8.sl7_0.x86_64.rpm shim-unsigned-0.7-8.sl7_0.x86_64.rpm - Scientific Linux Development Team