First published: Fri Jun 05 2020(Updated: )
A PGP signature bypass was found in fwupd, which could lead to possible installation of unsigned firmware. As per upstream: * For Red Hat Enterprise Linux 7: LVFS (LVFS (Linux Vendor Firmware Service) is: a secure portal which allows hardware vendors to upload firmware updates. The site is used by all major Linux distributions to provide metadata for clients such as fwupdmgr and GNOME Software.) was never enabled there although the PGP bypass is possible but not implementable. * For Red Hat Enterprise Linux 8: The LVFS is disabled and never used the Amazon CDN. PGP bypass possible, but not implementable. More information available at: <a class="bz_bug_link bz_secure " title="" href="show_bug.cgi?id=1841462">https://bugzilla.redhat.com/show_bug.cgi?id=1841462</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux | =7=8 | |
fwupd-signed |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1844316 is considered high due to the potential risk of installing unsigned firmware.
To fix REDHAT-BUG-1844316, ensure that you update the fwupd to the latest version provided by Red Hat.
Red Hat Enterprise Linux versions 7 and 8 are affected by REDHAT-BUG-1844316.
The implications of REDHAT-BUG-1844316 include the potential for unauthorized firmware installations, compromising system integrity.
Yes, fwupd is the primary software affected by REDHAT-BUG-1844316 in the context of Red Hat Enterprise Linux.