First published: Wed Oct 09 2024(Updated: )
Low: openssl security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openssl | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl-debuginfo | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl-debuginfo | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl-debugsource | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl-debugsource | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl-devel | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl-devel | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl-libs | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl-libs | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl-libs-debuginfo | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl-libs-debuginfo | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl-perl | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl-perl | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl-debuginfo | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl-debugsource | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl-devel | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl-libs | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl-libs-debuginfo | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl-perl | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl | <1.1.1k-14.el8_6.aa | 1.1.1k-14.el8_6.aa |
redhat/openssl-debuginfo | <1.1.1k-14.el8_6.aa | 1.1.1k-14.el8_6.aa |
redhat/openssl-debugsource | <1.1.1k-14.el8_6.aa | 1.1.1k-14.el8_6.aa |
redhat/openssl-devel | <1.1.1k-14.el8_6.aa | 1.1.1k-14.el8_6.aa |
redhat/openssl-libs | <1.1.1k-14.el8_6.aa | 1.1.1k-14.el8_6.aa |
redhat/openssl-libs-debuginfo | <1.1.1k-14.el8_6.aa | 1.1.1k-14.el8_6.aa |
redhat/openssl-perl | <1.1.1k-14.el8_6.aa | 1.1.1k-14.el8_6.aa |
Red Hat Enterprise Linux Server | ||
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
Red Hat Enterprise Linux for x86_64 - Extended Update Support | ||
Red Hat Enterprise Linux for ARM64 EUS | ||
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | ||
Red Hat Enterprise Linux for IBM z Systems | ||
Red Hat Enterprise Linux for SAP Solutions |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:7847 is classified as low.
To fix RHSA-2024:7847, update OpenSSL to version 1.1.1k-14.el8_6 or later.
RHSA-2024:7847 affects various versions of Red Hat Enterprise Linux including Server, Power, and x86_64 architectures.
RHSA-2024:7847 addresses vulnerabilities in the OpenSSL library related to SSL_select_next_proto buffer overread.
Yes, the specific package to update for RHSA-2024:7847 is OpenSSL.