Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2020-4436

Опубликовано: 10 нояб. 2020
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2020-4436: gnome-software and fwupd security, bug fix, and enhancement update (LOW)

appstream-data [8-20200724]

  • Regenerate the RHEL metadata to include the EPEL apps too
  • Resolves: #1844488

[8-20200630]

  • Regenerate the RHEL metadata
  • Resolves: #1844488

fwupd [1.4.2-4.0.1]

  • Build with the updated Oracle certificate
  • Use oraclesecureboot301 as certdir [Orabug: 29881368]
  • Use new signing certificate (Alex Burmashev)

[1.4.2-4]

  • Add signing with redhatsecureboot503 cert Related: CVE-2020-10713

[1.4.2-3]

  • Obsolete the now-dead fwupdate package to prevent file conflicts
  • Resolves: #1859202

[1.4.2-2]

  • Security fix for CVE-2020-10759
  • Resolves: #1844324

[1.4.2-1]

  • New upstream release
  • Backport a patch to fix the synaptics fingerprint reader update.
  • Resolves: #1775277

[1.4.1-1]

  • New upstream release
  • Resolves: #1775277

gnome-software [3.36.1-4]

  • Fix 'Show Details' to correctly work for rpm-installed firefox
  • Resolves: #1845714

[3.36.1-3]

  • Upload correct 3.36.1 tarball
  • Fix hardcoded desktop and appdata names to match whats in RHEL 8.3
  • Add back shell extensions support
  • Resolves: #1839774

[3.36.1-2]

  • Add support for basic auth and webflow auth in flatpak plugin
  • Resolves: #1815502

[3.36.1-1]

  • Update to 3.36.1
  • Resolves: #1797932

libxmlb [0.1.15-1]

  • Initial release for RHEL

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

appstream-data

8-20200724.el8

fwupd

1.4.2-4.0.1.el8

gnome-software

3.36.1-4.el8

libxmlb

0.1.15-1.el8

Oracle Linux x86_64

appstream-data

8-20200724.el8

fwupd

1.4.2-4.0.1.el8

gnome-software

3.36.1-4.el8

libxmlb

0.1.15-1.el8

Связанные CVE

Связанные уязвимости

CVSS3: 6
ubuntu
почти 5 лет назад

A PGP signature bypass flaw was found in fwupd (all versions), which could lead to the installation of unsigned firmware. As per upstream, a signature bypass is theoretically possible, but not practical because the Linux Vendor Firmware Service (LVFS) is either not implemented or enabled in versions of fwupd shipped with Red Hat Enterprise Linux 7 and 8. The highest threat from this vulnerability is to confidentiality and integrity.

CVSS3: 5.7
redhat
около 5 лет назад

A PGP signature bypass flaw was found in fwupd (all versions), which could lead to the installation of unsigned firmware. As per upstream, a signature bypass is theoretically possible, but not practical because the Linux Vendor Firmware Service (LVFS) is either not implemented or enabled in versions of fwupd shipped with Red Hat Enterprise Linux 7 and 8. The highest threat from this vulnerability is to confidentiality and integrity.

CVSS3: 6
nvd
почти 5 лет назад

A PGP signature bypass flaw was found in fwupd (all versions), which could lead to the installation of unsigned firmware. As per upstream, a signature bypass is theoretically possible, but not practical because the Linux Vendor Firmware Service (LVFS) is either not implemented or enabled in versions of fwupd shipped with Red Hat Enterprise Linux 7 and 8. The highest threat from this vulnerability is to confidentiality and integrity.

CVSS3: 6
debian
почти 5 лет назад

A PGP signature bypass flaw was found in fwupd (all versions), which c ...

suse-cvrf
около 4 лет назад

Security update for fwupd