First published: Wed Oct 09 2024(Updated: )
Low: openssl security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openssl | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl-debuginfo | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl-debuginfo | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl-debugsource | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl-debugsource | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl-devel | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl-devel | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl-libs | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl-libs | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl-libs-debuginfo | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl-libs-debuginfo | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl-perl | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl-perl | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl-debuginfo | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl-debugsource | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl-devel | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl-libs | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl-libs-debuginfo | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl-perl | <1.1.1k-14.el8_6 | 1.1.1k-14.el8_6 |
redhat/openssl | <1.1.1k-14.el8_6.aa | 1.1.1k-14.el8_6.aa |
redhat/openssl-debuginfo | <1.1.1k-14.el8_6.aa | 1.1.1k-14.el8_6.aa |
redhat/openssl-debugsource | <1.1.1k-14.el8_6.aa | 1.1.1k-14.el8_6.aa |
redhat/openssl-devel | <1.1.1k-14.el8_6.aa | 1.1.1k-14.el8_6.aa |
redhat/openssl-libs | <1.1.1k-14.el8_6.aa | 1.1.1k-14.el8_6.aa |
redhat/openssl-libs-debuginfo | <1.1.1k-14.el8_6.aa | 1.1.1k-14.el8_6.aa |
redhat/openssl-perl | <1.1.1k-14.el8_6.aa | 1.1.1k-14.el8_6.aa |
Red Hat Enterprise Linux 8 | ||
Red Hat Enterprise Linux for ARM 64 | ||
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
Red Hat Enterprise Linux Server for IBM z Systems |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:7848 is classified as low.
You can fix RHSA-2024:7848 by updating the OpenSSL package to version 1.1.1k-14.el8_6.
RHSA-2024:7848 affects Red Hat Enterprise Linux variants, including x86_64, ARM 64, Power, and IBM z Systems.
The vulnerability in RHSA-2024:7848 is related to a buffer overread issue in the SSL_select_next_proto function of OpenSSL.
Yes, a new version 1.1.1k-14.el8_6 has been released to address the vulnerability in RHSA-2024:7848.