First published: Tue Mar 05 2024(Updated: )
Moderate: fwupd security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/fwupd | <1.7.4-3.el8_6 | 1.7.4-3.el8_6 |
redhat/fwupd | <1.7.4-3.el8_6 | 1.7.4-3.el8_6 |
redhat/fwupd-debuginfo | <1.7.4-3.el8_6 | 1.7.4-3.el8_6 |
redhat/fwupd-debugsource | <1.7.4-3.el8_6 | 1.7.4-3.el8_6 |
redhat/fwupd-tests-debuginfo | <1.7.4-3.el8_6 | 1.7.4-3.el8_6 |
redhat/fwupd-debuginfo | <1.7.4-3.el8_6 | 1.7.4-3.el8_6 |
redhat/fwupd-debugsource | <1.7.4-3.el8_6 | 1.7.4-3.el8_6 |
redhat/fwupd-tests-debuginfo | <1.7.4-3.el8_6 | 1.7.4-3.el8_6 |
redhat/fwupd | <1.7.4-3.el8_6 | 1.7.4-3.el8_6 |
redhat/fwupd-debuginfo | <1.7.4-3.el8_6 | 1.7.4-3.el8_6 |
redhat/fwupd-debugsource | <1.7.4-3.el8_6 | 1.7.4-3.el8_6 |
redhat/fwupd | <1.7.4-3.el8_6.aa | 1.7.4-3.el8_6.aa |
redhat/fwupd-debuginfo | <1.7.4-3.el8_6.aa | 1.7.4-3.el8_6.aa |
redhat/fwupd-debugsource | <1.7.4-3.el8_6.aa | 1.7.4-3.el8_6.aa |
redhat/fwupd-tests-debuginfo | <1.7.4-3.el8_6.aa | 1.7.4-3.el8_6.aa |
redhat/fwupd-devel | <1.7.4-3.el8_6 | 1.7.4-3.el8_6 |
redhat/fwupd-devel | <1.7.4-3.el8_6 | 1.7.4-3.el8_6 |
redhat/fwupd-devel | <1.7.4-3.el8_6 | 1.7.4-3.el8_6 |
redhat/fwupd-devel | <1.7.4-3.el8_6.aa | 1.7.4-3.el8_6.aa |
Red Hat Enterprise Linux for ARM64 EUS | ||
Red Hat Enterprise Linux for x86_64 - Extended Update Support | ||
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support | ||
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | ||
Red Hat CodeReady Linux Builder for IBM z Systems | ||
Red Hat Enterprise Linux Server | ||
Red Hat Enterprise Linux for IBM z Systems | ||
Red Hat Enterprise Linux Server | ||
Red Hat Enterprise Linux for SAP Solutions | ||
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support | ||
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:1106 is classified as moderate.
To fix RHSA-2024:1106, update the fwupd package to version 1.7.4-3.el8_6 or later.
RHSA-2024:1106 addresses a security vulnerability where a password in /etc/fwupd/redfish.conf is world readable.
RHSA-2024:1106 affects various Red Hat Enterprise Linux products across different architectures.
The CVE associated with RHSA-2024:1106 is CVE-2022-3287.