First published: Tue Jul 09 2024(Updated: )
Important: pki-core security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/pki-core | <11.0.6-3.el9_0 | 11.0.6-3.el9_0 |
redhat/pki-acme | <11.0.6-3.el9_0 | 11.0.6-3.el9_0 |
redhat/pki-base | <11.0.6-3.el9_0 | 11.0.6-3.el9_0 |
redhat/pki-base-java | <11.0.6-3.el9_0 | 11.0.6-3.el9_0 |
redhat/pki-ca | <11.0.6-3.el9_0 | 11.0.6-3.el9_0 |
redhat/pki-kra | <11.0.6-3.el9_0 | 11.0.6-3.el9_0 |
redhat/pki-server | <11.0.6-3.el9_0 | 11.0.6-3.el9_0 |
redhat/pki-symkey | <11.0.6-3.el9_0 | 11.0.6-3.el9_0 |
redhat/pki-tools | <11.0.6-3.el9_0 | 11.0.6-3.el9_0 |
redhat/python3-pki | <11.0.6-3.el9_0 | 11.0.6-3.el9_0 |
redhat/pki-symkey | <11.0.6-3.el9_0 | 11.0.6-3.el9_0 |
redhat/pki-tools | <11.0.6-3.el9_0 | 11.0.6-3.el9_0 |
redhat/pki-symkey | <11.0.6-3.el9_0.aa | 11.0.6-3.el9_0.aa |
redhat/pki-tools | <11.0.6-3.el9_0.aa | 11.0.6-3.el9_0.aa |
redhat/pki-symkey | <11.0.6-3.el9_0 | 11.0.6-3.el9_0 |
redhat/pki-tools | <11.0.6-3.el9_0 | 11.0.6-3.el9_0 |
Red Hat Enterprise Linux Server | ||
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | ||
Red Hat Enterprise Linux for SAP Solutions | ||
Red Hat Enterprise Linux Server for IBM z Systems |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:4413 is classified as Important.
To fix RHSA-2024:4413, update the affected packages to version 11.0.6-3.el9_0 or later.
RHSA-2024:4413 addresses a token authentication bypass vulnerability identified as CVE-2023-4727.
Packages affected by RHSA-2024:4413 include pki-core, pki-acme, pki-base, pki-ca, pki-server, among others.
RHSA-2024:4413 impacts various Red Hat Enterprise Linux Server products across multiple architectures.