First published: Mon May 06 2024(Updated: )
Important: varnish security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/varnish | <6.6.2-2.el9_0.3 | 6.6.2-2.el9_0.3 |
redhat/varnish | <6.6.2-2.el9_0.3 | 6.6.2-2.el9_0.3 |
redhat/varnish-docs | <6.6.2-2.el9_0.3 | 6.6.2-2.el9_0.3 |
redhat/varnish-docs | <6.6.2-2.el9_0.3 | 6.6.2-2.el9_0.3 |
redhat/varnish | <6.6.2-2.el9_0.3 | 6.6.2-2.el9_0.3 |
redhat/varnish-docs | <6.6.2-2.el9_0.3 | 6.6.2-2.el9_0.3 |
redhat/varnish | <6.6.2-2.el9_0.3.aa | 6.6.2-2.el9_0.3.aa |
redhat/varnish-docs | <6.6.2-2.el9_0.3.aa | 6.6.2-2.el9_0.3.aa |
redhat/varnish-devel | <6.6.2-2.el9_0.3 | 6.6.2-2.el9_0.3 |
redhat/varnish-devel | <6.6.2-2.el9_0.3 | 6.6.2-2.el9_0.3 |
redhat/varnish-devel | <6.6.2-2.el9_0.3 | 6.6.2-2.el9_0.3 |
redhat/varnish-devel | <6.6.2-2.el9_0.3.aa | 6.6.2-2.el9_0.3.aa |
Red Hat Enterprise Linux for ARM64 EUS | ||
Red Hat Enterprise Linux for SAP Solutions | ||
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support | ||
Red Hat Enterprise Linux Server | ||
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | ||
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support | ||
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support | ||
Red Hat Enterprise Linux for IBM z Systems | ||
Red Hat Enterprise Linux for x86_64 - Extended Update Support | ||
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
Red Hat CodeReady Linux Builder for IBM z Systems | ||
Red Hat Enterprise Linux Server for IBM z Systems |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:2700 is classified as important.
To fix RHSA-2024:2700, upgrade the varnish package to version 6.6.2-2.el9_0.3 or later.
RHSA-2024:2700 affects multiple Red Hat Enterprise Linux products for ARM 64, x86_64, Power LE, and IBM z Systems.
RHSA-2024:2700 addresses a security flaw found in the HTTP/2 implementation in Varnish Cache.
Yes, the varnish-docs package also needs to be updated to version 6.6.2-2.el9_0.3 to resolve the vulnerability.