<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for shim</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2024:1462-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-04-29T11:20:38Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-04-29T11:20:38Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-04-29T11:20:38Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for shim</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for shim fixes the following issues:

- Update shim-install to set the TPM2 SRK algorithm (bsc#1213945)
- Limit the requirement of fde-tpm-helper-macros to the distro with
  suse_version 1600 and above (bsc#1219460)

Update to version 15.8:

Security issues fixed:

- mok: fix LogError() invocation (bsc#1215099,CVE-2023-40546)
- avoid incorrectly trusting HTTP headers (bsc#1215098,CVE-2023-40547)
- Fix integer overflow on SBAT section size on 32-bit system (bsc#1215100,CVE-2023-40548)
- Authenticode: verify that the signature header is in bounds (bsc#1215101,CVE-2023-40549)
- pe: Fix an out-of-bound read in verify_buffer_sbat() (bsc#1215102,CVE-2023-40550)
- pe-relocate: Fix bounds check for MZ binaries (bsc#1215103,CVE-2023-40551)

        
The NX flag is disable which is same as the default value of shim-15.8, hence, not need to enable it by this patch now.

- Generate dbx during build so we don't include binary files in sources
- Don't require grub so shim can still be used with systemd-boot
- Update shim-install to fix boot failure of ext4 root file system
  on RAID10 (bsc#1205855)
- Adopt the macros from fde-tpm-helper-macros to update the
  signature in the sealed key after a bootloader upgrade

- Update shim-install to amend full disk encryption support
  - Adopt TPM 2.0 Key File for grub2 TPM 2.0 protector
  - Use the long name to specify the grub2 key protector
  - cryptodisk: support TPM authorized policies
  - Do not use tpm_record_pcrs unless the command is in command.lst

- Removed POST_PROCESS_PE_FLAGS=-N from the build command in shim.spec to
  enable the NX compatibility flag when using post-process-pe after
  discussed with grub2 experts in mail. It's useful for further development
  and testing. (bsc#1205588)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">Image SLES12-SP5-EC2-BYOS-2024-1462,Image SLES12-SP5-EC2-ECS-On-Demand-2024-1462,Image SLES12-SP5-EC2-On-Demand-2024-1462,Image SLES12-SP5-EC2-SAP-BYOS-2024-1462,Image SLES12-SP5-EC2-SAP-On-Demand-2024-1462,Image SLES12-SP5-GCE-BYOS-2024-1462,Image SLES12-SP5-GCE-On-Demand-2024-1462,Image SLES12-SP5-GCE-SAP-BYOS-2024-1462,Image SLES12-SP5-GCE-SAP-On-Demand-2024-1462,Image SLES12-SP5-SAP-Azure-LI-BYOS-Production-2024-1462,Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production-2024-1462,SUSE-2024-1462,SUSE-SLE-SERVER-12-SP5-2024-1462</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241462-1/</URL>
      <Description>Link for SUSE-SU-2024:1462-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2024-April/035120.html</URL>
      <Description>E-Mail link for SUSE-SU-2024:1462-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1198101</URL>
      <Description>SUSE Bug 1198101</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1205588</URL>
      <Description>SUSE Bug 1205588</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1205855</URL>
      <Description>SUSE Bug 1205855</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1210382</URL>
      <Description>SUSE Bug 1210382</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213945</URL>
      <Description>SUSE Bug 1213945</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1215098</URL>
      <Description>SUSE Bug 1215098</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1215099</URL>
      <Description>SUSE Bug 1215099</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1215100</URL>
      <Description>SUSE Bug 1215100</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1215101</URL>
      <Description>SUSE Bug 1215101</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1215102</URL>
      <Description>SUSE Bug 1215102</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1215103</URL>
      <Description>SUSE Bug 1215103</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1219460</URL>
      <Description>SUSE Bug 1219460</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-28737/</URL>
      <Description>SUSE CVE CVE-2022-28737 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-40546/</URL>
      <Description>SUSE CVE CVE-2023-40546 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-40547/</URL>
      <Description>SUSE CVE CVE-2023-40547 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-40548/</URL>
      <Description>SUSE CVE CVE-2023-40548 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-40549/</URL>
      <Description>SUSE CVE CVE-2023-40549 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-40550/</URL>
      <Description>SUSE CVE CVE-2023-40550 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-40551/</URL>
      <Description>SUSE CVE CVE-2023-40551 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="Image SLES12-SP5-EC2-BYOS">
      <Branch Type="Product Name" Name="Image SLES12-SP5-EC2-BYOS">
        <FullProductName ProductID="Image SLES12-SP5-EC2-BYOS">Image SLES12-SP5-EC2-BYOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-EC2-ECS-On-Demand">
      <Branch Type="Product Name" Name="Image SLES12-SP5-EC2-ECS-On-Demand">
        <FullProductName ProductID="Image SLES12-SP5-EC2-ECS-On-Demand">Image SLES12-SP5-EC2-ECS-On-Demand</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-EC2-On-Demand">
      <Branch Type="Product Name" Name="Image SLES12-SP5-EC2-On-Demand">
        <FullProductName ProductID="Image SLES12-SP5-EC2-On-Demand">Image SLES12-SP5-EC2-On-Demand</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-EC2-SAP-BYOS">
      <Branch Type="Product Name" Name="Image SLES12-SP5-EC2-SAP-BYOS">
        <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-BYOS">Image SLES12-SP5-EC2-SAP-BYOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-EC2-SAP-On-Demand">
      <Branch Type="Product Name" Name="Image SLES12-SP5-EC2-SAP-On-Demand">
        <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-On-Demand">Image SLES12-SP5-EC2-SAP-On-Demand</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-GCE-BYOS">
      <Branch Type="Product Name" Name="Image SLES12-SP5-GCE-BYOS">
        <FullProductName ProductID="Image SLES12-SP5-GCE-BYOS">Image SLES12-SP5-GCE-BYOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-GCE-On-Demand">
      <Branch Type="Product Name" Name="Image SLES12-SP5-GCE-On-Demand">
        <FullProductName ProductID="Image SLES12-SP5-GCE-On-Demand">Image SLES12-SP5-GCE-On-Demand</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-GCE-SAP-BYOS">
      <Branch Type="Product Name" Name="Image SLES12-SP5-GCE-SAP-BYOS">
        <FullProductName ProductID="Image SLES12-SP5-GCE-SAP-BYOS">Image SLES12-SP5-GCE-SAP-BYOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-GCE-SAP-On-Demand">
      <Branch Type="Product Name" Name="Image SLES12-SP5-GCE-SAP-On-Demand">
        <FullProductName ProductID="Image SLES12-SP5-GCE-SAP-On-Demand">Image SLES12-SP5-GCE-SAP-On-Demand</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production">
      <Branch Type="Product Name" Name="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production">
        <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production">Image SLES12-SP5-SAP-Azure-LI-BYOS-Production</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production">
      <Branch Type="Product Name" Name="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production">
        <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production">Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5" CPE="cpe:/o:suse:sles:12:sp5">SUSE Linux Enterprise Server 12 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP5" CPE="cpe:/o:suse:sles_sap:12:sp5">SUSE Linux Enterprise Server for SAP Applications 12 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="shim-15.8-25.30.1">
      <FullProductName ProductID="shim-15.8-25.30.1">shim-15.8-25.30.1</FullProductName>
    </Branch>
    <Relationship ProductReference="shim-15.8-25.30.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-EC2-BYOS:shim-15.8-25.30.1">shim-15.8-25.30.1 as a component of Image SLES12-SP5-EC2-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="shim-15.8-25.30.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-ECS-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-EC2-ECS-On-Demand:shim-15.8-25.30.1">shim-15.8-25.30.1 as a component of Image SLES12-SP5-EC2-ECS-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="shim-15.8-25.30.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-EC2-On-Demand:shim-15.8-25.30.1">shim-15.8-25.30.1 as a component of Image SLES12-SP5-EC2-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="shim-15.8-25.30.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-BYOS:shim-15.8-25.30.1">shim-15.8-25.30.1 as a component of Image SLES12-SP5-EC2-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="shim-15.8-25.30.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-SAP-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-On-Demand:shim-15.8-25.30.1">shim-15.8-25.30.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="shim-15.8-25.30.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-GCE-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-GCE-BYOS:shim-15.8-25.30.1">shim-15.8-25.30.1 as a component of Image SLES12-SP5-GCE-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="shim-15.8-25.30.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-GCE-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-GCE-On-Demand:shim-15.8-25.30.1">shim-15.8-25.30.1 as a component of Image SLES12-SP5-GCE-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="shim-15.8-25.30.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-GCE-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-GCE-SAP-BYOS:shim-15.8-25.30.1">shim-15.8-25.30.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="shim-15.8-25.30.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-GCE-SAP-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-GCE-SAP-On-Demand:shim-15.8-25.30.1">shim-15.8-25.30.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="shim-15.8-25.30.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production">
      <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:shim-15.8-25.30.1">shim-15.8-25.30.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production</FullProductName>
    </Relationship>
    <Relationship ProductReference="shim-15.8-25.30.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production">
      <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:shim-15.8-25.30.1">shim-15.8-25.30.1 as a component of Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production</FullProductName>
    </Relationship>
    <Relationship ProductReference="shim-15.8-25.30.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5:shim-15.8-25.30.1">shim-15.8-25.30.1 as a component of SUSE Linux Enterprise Server 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="shim-15.8-25.30.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP5:shim-15.8-25.30.1">shim-15.8-25.30.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There's a possible overflow in handle_image() when shim tries to load and execute crafted EFI executables; The handle_image() function takes into account the SizeOfRawData field from each section to be loaded. An attacker can leverage this to perform out-of-bound writes into memory. Arbitrary code execution is not discarded in such scenario.</Note>
    </Notes>
    <CVE>CVE-2022-28737</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:shim-15.8-25.30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:shim-15.8-25.30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:shim-15.8-25.30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241462-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-28737.html</URL>
        <Description>CVE-2022-28737</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1198458</URL>
        <Description>SUSE Bug 1198458</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1205065</URL>
        <Description>SUSE Bug 1205065</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1205066</URL>
        <Description>SUSE Bug 1205066</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1205831</URL>
        <Description>SUSE Bug 1205831</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in Shim when an error happened while creating a new ESL variable. If Shim fails to create the new variable, it tries to print an error message to the user; however, the number of parameters used by the logging function doesn't match the format string used by it, leading to a crash under certain circumstances.</Note>
    </Notes>
    <CVE>CVE-2023-40546</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:shim-15.8-25.30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:shim-15.8-25.30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:shim-15.8-25.30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241462-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-40546.html</URL>
        <Description>CVE-2023-40546</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215099</URL>
        <Description>SUSE Bug 1215099</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.</Note>
    </Notes>
    <CVE>CVE-2023-40547</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:shim-15.8-25.30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:shim-15.8-25.30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:shim-15.8-25.30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241462-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-40547.html</URL>
        <Description>CVE-2023-40547</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215098</URL>
        <Description>SUSE Bug 1215098</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.</Note>
    </Notes>
    <CVE>CVE-2023-40548</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:shim-15.8-25.30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:shim-15.8-25.30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:shim-15.8-25.30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241462-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-40548.html</URL>
        <Description>CVE-2023-40548</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215100</URL>
        <Description>SUSE Bug 1215100</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An out-of-bounds read flaw was found in Shim due to the lack of proper boundary verification during the load of a PE binary. This flaw allows an attacker to load a crafted PE binary, triggering the issue and crashing Shim, resulting in a denial of service.</Note>
    </Notes>
    <CVE>CVE-2023-40549</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:shim-15.8-25.30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:shim-15.8-25.30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:shim-15.8-25.30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241462-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-40549.html</URL>
        <Description>CVE-2023-40549</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215101</URL>
        <Description>SUSE Bug 1215101</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An out-of-bounds read flaw was found in Shim when it tried to validate the SBAT information. This issue may expose sensitive data during the system's boot phase.</Note>
    </Notes>
    <CVE>CVE-2023-40550</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:shim-15.8-25.30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:shim-15.8-25.30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:shim-15.8-25.30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241462-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-40550.html</URL>
        <Description>CVE-2023-40550</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215102</URL>
        <Description>SUSE Bug 1215102</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the MZ binary format in Shim. An out-of-bounds read may occur, leading to a crash or possible exposure of sensitive data during the system's boot phase.</Note>
    </Notes>
    <CVE>CVE-2023-40551</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-BYOS:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-On-Demand:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-BYOS:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-GCE-SAP-On-Demand:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:shim-15.8-25.30.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:shim-15.8-25.30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:shim-15.8-25.30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:shim-15.8-25.30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241462-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-40551.html</URL>
        <Description>CVE-2023-40551</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215103</URL>
        <Description>SUSE Bug 1215103</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
