First published: Tue Apr 23 2024(Updated: )
Important: shim security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/shim | <15.8-3.el7 | 15.8-3.el7 |
redhat/shim-signed | <15.8-1.el7 | 15.8-1.el7 |
redhat/mokutil | <15.8-1.el7 | 15.8-1.el7 |
redhat/mokutil-debuginfo | <15.8-1.el7 | 15.8-1.el7 |
redhat/shim-ia32 | <15.8-1.el7 | 15.8-1.el7 |
redhat/shim-unsigned-ia32 | <15.8-3.el7 | 15.8-3.el7 |
redhat/shim-unsigned-x64 | <15.8-3.el7 | 15.8-3.el7 |
redhat/shim-x64 | <15.8-1.el7 | 15.8-1.el7 |
Red Hat Enterprise Linux for Scientific Computing | ||
Red Hat Enterprise Linux 8 | ||
Red Hat Enterprise Linux | ||
Red Hat Enterprise Linux Workstation Supplementary | ||
Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:1959 is classified as Important.
To address RHSA-2024:1959, you should update the affected shim packages to version 15.8-3.el7 or later.
RHSA-2024:1959 addresses a remote code execution vulnerability in HTTP boot support that may lead to Secure Boot bypass (CVE-2023-40547).
RHSA-2024:1959 affects various editions of Red Hat Enterprise Linux, including Server, Desktop, Scientific Computing, and Workstation.
The packages impacted by RHSA-2024:1959 include shim, shim-signed, mokutil, and related shim-unsigned and shim-ia32 packages.