First published: Mon Jan 29 2024(Updated: )
Moderate: gnutls security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/gnutls | <3.7.6-23.el9_3.3 | 3.7.6-23.el9_3.3 |
redhat/gnutls | <3.7.6-23.el9_3.3 | 3.7.6-23.el9_3.3 |
redhat/gnutls-dane | <3.7.6-23.el9_3.3 | 3.7.6-23.el9_3.3 |
redhat/gnutls-dane | <3.7.6-23.el9_3.3 | 3.7.6-23.el9_3.3 |
redhat/gnutls-dane-debuginfo | <3.7.6-23.el9_3.3 | 3.7.6-23.el9_3.3 |
redhat/gnutls-dane-debuginfo | <3.7.6-23.el9_3.3 | 3.7.6-23.el9_3.3 |
redhat/gnutls-debuginfo | <3.7.6-23.el9_3.3 | 3.7.6-23.el9_3.3 |
redhat/gnutls-debuginfo | <3.7.6-23.el9_3.3 | 3.7.6-23.el9_3.3 |
redhat/gnutls-debugsource | <3.7.6-23.el9_3.3 | 3.7.6-23.el9_3.3 |
redhat/gnutls-debugsource | <3.7.6-23.el9_3.3 | 3.7.6-23.el9_3.3 |
redhat/gnutls-devel | <3.7.6-23.el9_3.3 | 3.7.6-23.el9_3.3 |
redhat/gnutls-devel | <3.7.6-23.el9_3.3 | 3.7.6-23.el9_3.3 |
redhat/gnutls-utils | <3.7.6-23.el9_3.3 | 3.7.6-23.el9_3.3 |
redhat/gnutls-utils-debuginfo | <3.7.6-23.el9_3.3 | 3.7.6-23.el9_3.3 |
redhat/gnutls-utils-debuginfo | <3.7.6-23.el9_3.3 | 3.7.6-23.el9_3.3 |
redhat/gnutls-utils | <3.7.6-23.el9_3.3 | 3.7.6-23.el9_3.3 |
redhat/gnutls | <3.7.6-23.el9_3.3 | 3.7.6-23.el9_3.3 |
redhat/gnutls-dane | <3.7.6-23.el9_3.3 | 3.7.6-23.el9_3.3 |
redhat/gnutls-dane-debuginfo | <3.7.6-23.el9_3.3 | 3.7.6-23.el9_3.3 |
redhat/gnutls-debuginfo | <3.7.6-23.el9_3.3 | 3.7.6-23.el9_3.3 |
redhat/gnutls-debugsource | <3.7.6-23.el9_3.3 | 3.7.6-23.el9_3.3 |
redhat/gnutls-devel | <3.7.6-23.el9_3.3 | 3.7.6-23.el9_3.3 |
redhat/gnutls-utils | <3.7.6-23.el9_3.3 | 3.7.6-23.el9_3.3 |
redhat/gnutls-utils-debuginfo | <3.7.6-23.el9_3.3 | 3.7.6-23.el9_3.3 |
redhat/gnutls | <3.7.6-23.el9_3.3.aa | 3.7.6-23.el9_3.3.aa |
redhat/gnutls-dane | <3.7.6-23.el9_3.3.aa | 3.7.6-23.el9_3.3.aa |
redhat/gnutls-dane-debuginfo | <3.7.6-23.el9_3.3.aa | 3.7.6-23.el9_3.3.aa |
redhat/gnutls-debuginfo | <3.7.6-23.el9_3.3.aa | 3.7.6-23.el9_3.3.aa |
redhat/gnutls-debugsource | <3.7.6-23.el9_3.3.aa | 3.7.6-23.el9_3.3.aa |
redhat/gnutls-devel | <3.7.6-23.el9_3.3.aa | 3.7.6-23.el9_3.3.aa |
redhat/gnutls-utils | <3.7.6-23.el9_3.3.aa | 3.7.6-23.el9_3.3.aa |
redhat/gnutls-utils-debuginfo | <3.7.6-23.el9_3.3.aa | 3.7.6-23.el9_3.3.aa |
Red Hat Red Hat Enterprise Linux for Power, little endian | ||
Red Hat Enterprise Linux 8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:0533 is classified as Moderate.
To fix RHSA-2024:0533, you should update the gnutls packages to version 3.7.6-23.el9_3.3.
RHSA-2024:0533 affects multiple products including Red Hat Enterprise Linux for Power, ARM 64, and various gnutls package versions.
RHSA-2024:0533 addresses a timing side-channel vulnerability in the RSA-PSK authentication.
Yes, it is recommended to apply the update for RHSA-2024:0533 to mitigate potential security risks.