First published: Tue Mar 05 2024(Updated: )
Keylime is a TPM based highly scalable remote boot attestation and runtime integrity measurement solution.<br>Security Fix(es):<br><li> keylime: Attestation failure when the quote's signature does not validate (CVE-2023-3674)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/keylime | <7.3.0-13.el9_3 | 7.3.0-13.el9_3 |
redhat/keylime | <7.3.0-13.el9_3 | 7.3.0-13.el9_3 |
redhat/keylime-base | <7.3.0-13.el9_3 | 7.3.0-13.el9_3 |
redhat/keylime-registrar | <7.3.0-13.el9_3 | 7.3.0-13.el9_3 |
redhat/keylime-selinux | <7.3.0-13.el9_3 | 7.3.0-13.el9_3 |
redhat/keylime-tenant | <7.3.0-13.el9_3 | 7.3.0-13.el9_3 |
redhat/keylime-verifier | <7.3.0-13.el9_3 | 7.3.0-13.el9_3 |
redhat/python3-keylime | <7.3.0-13.el9_3 | 7.3.0-13.el9_3 |
redhat/keylime-base | <7.3.0-13.el9_3 | 7.3.0-13.el9_3 |
redhat/keylime-registrar | <7.3.0-13.el9_3 | 7.3.0-13.el9_3 |
redhat/keylime-tenant | <7.3.0-13.el9_3 | 7.3.0-13.el9_3 |
redhat/keylime-verifier | <7.3.0-13.el9_3 | 7.3.0-13.el9_3 |
redhat/python3-keylime | <7.3.0-13.el9_3 | 7.3.0-13.el9_3 |
redhat/keylime | <7.3.0-13.el9_3 | 7.3.0-13.el9_3 |
redhat/keylime-base | <7.3.0-13.el9_3 | 7.3.0-13.el9_3 |
redhat/keylime-registrar | <7.3.0-13.el9_3 | 7.3.0-13.el9_3 |
redhat/keylime-tenant | <7.3.0-13.el9_3 | 7.3.0-13.el9_3 |
redhat/keylime-verifier | <7.3.0-13.el9_3 | 7.3.0-13.el9_3 |
redhat/python3-keylime | <7.3.0-13.el9_3 | 7.3.0-13.el9_3 |
redhat/keylime | <7.3.0-13.el9_3.aa | 7.3.0-13.el9_3.aa |
redhat/keylime-base | <7.3.0-13.el9_3.aa | 7.3.0-13.el9_3.aa |
redhat/keylime-registrar | <7.3.0-13.el9_3.aa | 7.3.0-13.el9_3.aa |
redhat/keylime-tenant | <7.3.0-13.el9_3.aa | 7.3.0-13.el9_3.aa |
redhat/keylime-verifier | <7.3.0-13.el9_3.aa | 7.3.0-13.el9_3.aa |
redhat/python3-keylime | <7.3.0-13.el9_3.aa | 7.3.0-13.el9_3.aa |
Red Hat Enterprise Linux 8 | ||
Red Hat Enterprise Linux Server for IBM z Systems | ||
Red Hat Enterprise Linux for ARM 64 | ||
Red Hat Enterprise Linux for Power, little endian - Extended Update Support |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:1139 is classified as low.
To fix RHSA-2024:1139, update the affected packages to version 7.3.0-13.el9_3 or later.
RHSA-2024:1139 affects Red Hat Enterprise Linux for x86_64, IBM z Systems, ARM 64, and Power little endian.
RHSA-2024:1139 addresses an attestation failure when the quote's signature does not validate.
Yes, RHSA-2024:1139 relates to a security issue in Keylime's remote boot attestation and runtime integrity measurement functionalities.