{"id":"AZL-41063","summary":"CVE-2022-28737 affecting package shim-unsigned-x64 for versions less than 15.8-3","details":"There's a possible overflow in handle_image() when shim tries to load and execute crafted EFI executables; The handle_image() function takes into account the SizeOfRawData field from each section to be loaded. An attacker can leverage this to perform out-of-bound writes into memory. Arbitrary code execution is not discarded in such scenario.","modified":"2026-04-01T05:14:42.156089Z","published":"2023-07-20T01:15:10Z","upstream":["CVE-2022-28737"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-28737"}],"affected":[{"package":{"name":"shim-unsigned-x64","ecosystem":"Azure Linux:3","purl":"pkg:rpm/azure-linux/shim-unsigned-x64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"15.8-3"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-41063.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}