First published: Tue Mar 19 2024(Updated: )
Moderate: fwupd security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/fwupd | <1.7.8-2.el8_8 | 1.7.8-2.el8_8 |
redhat/fwupd | <1.7.8-2.el8_8 | 1.7.8-2.el8_8 |
redhat/fwupd-debuginfo | <1.7.8-2.el8_8 | 1.7.8-2.el8_8 |
redhat/fwupd-debugsource | <1.7.8-2.el8_8 | 1.7.8-2.el8_8 |
redhat/fwupd-tests-debuginfo | <1.7.8-2.el8_8 | 1.7.8-2.el8_8 |
redhat/fwupd-debuginfo | <1.7.8-2.el8_8 | 1.7.8-2.el8_8 |
redhat/fwupd-debugsource | <1.7.8-2.el8_8 | 1.7.8-2.el8_8 |
redhat/fwupd-tests-debuginfo | <1.7.8-2.el8_8 | 1.7.8-2.el8_8 |
redhat/fwupd | <1.7.8-2.el8_8 | 1.7.8-2.el8_8 |
redhat/fwupd-debuginfo | <1.7.8-2.el8_8 | 1.7.8-2.el8_8 |
redhat/fwupd-debugsource | <1.7.8-2.el8_8 | 1.7.8-2.el8_8 |
redhat/fwupd | <1.7.8-2.el8_8.aa | 1.7.8-2.el8_8.aa |
redhat/fwupd-debuginfo | <1.7.8-2.el8_8.aa | 1.7.8-2.el8_8.aa |
redhat/fwupd-debugsource | <1.7.8-2.el8_8.aa | 1.7.8-2.el8_8.aa |
redhat/fwupd-tests-debuginfo | <1.7.8-2.el8_8.aa | 1.7.8-2.el8_8.aa |
redhat/fwupd-devel | <1.7.8-2.el8_8 | 1.7.8-2.el8_8 |
redhat/fwupd-devel | <1.7.8-2.el8_8 | 1.7.8-2.el8_8 |
redhat/fwupd-devel | <1.7.8-2.el8_8 | 1.7.8-2.el8_8 |
redhat/fwupd-devel | <1.7.8-2.el8_8.aa | 1.7.8-2.el8_8.aa |
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | ||
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
Red Hat Enterprise Linux for x86_64 - Extended Update Support | ||
Red Hat Enterprise Linux for ARM64 EUS | ||
Red Hat CodeReady Linux Builder for IBM z Systems | ||
Red Hat Enterprise Linux for IBM z Systems | ||
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support | ||
Red Hat Enterprise Linux Server | ||
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support | ||
Red Hat Enterprise Linux for SAP Solutions | ||
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:1403 is categorized as moderate.
To resolve RHSA-2024:1403, update the fwupd package to version 1.7.8-2.el8_8 or later.
RHSA-2024:1403 addresses a vulnerability where a world-readable password exists in /etc/fwupd/redfish.conf, identified as CVE-2022-3287.
RHSA-2024:1403 affects all users of the fwupd package on supported versions of Red Hat Enterprise Linux.
There is no specific workaround for RHSA-2024:1403; applying the security update is recommended.