{"id":"RHSA-2021:1734","summary":"Red Hat Security Advisory: shim security update","modified":"2025-11-22T12:20:11Z","published":"2024-09-16T05:31:48Z","upstream":["CVE-2020-14372","CVE-2020-25632","CVE-2020-25647","CVE-2020-27749","CVE-2020-27779","CVE-2021-20225","CVE-2021-20233"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2021:1734"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"ARTICLE","url":"https://access.redhat.com/security/vulnerabilities/RHSB-2021-003"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1873150"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1879577"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1886936"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1899966"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1900698"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1924696"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1926263"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1734.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-14372"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-14372"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-14372"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-25632"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-25632"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-25632"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-25647"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-25647"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-25647"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-27749"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-27749"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-27749"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-27779"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-27779"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-27779"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-20225"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-20225"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-20225"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-20233"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-20233"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-20233"}],"affected":[{"package":{"name":"shim","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/shim"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:15.4-2.el8_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:1734.json"}},{"package":{"name":"shim-aa64","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/shim-aa64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:15.4-2.el8_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:1734.json"}},{"package":{"name":"shim-ia32","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/shim-ia32"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:15.4-2.el8_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:1734.json"}},{"package":{"name":"shim-x64","ecosystem":"Red Hat:enterprise_linux:8::baseos","purl":"pkg:rpm/redhat/shim-x64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:15.4-2.el8_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:1734.json"}},{"package":{"name":"shim-unsigned-aarch64","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/shim-unsigned-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:15-7.el8_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:1734.json"}},{"package":{"name":"shim-unsigned-x64","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/shim-unsigned-x64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:15.4-4.el8_1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:1734.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"}]}