GnuTLS security update for incomplete CVE-2023-5981 fi
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | CVE-2024-0553 | 16 Jan 202411:57 | – | redhatcve |
![]() | CVE-2023-5981 | 28 Nov 202311:49 | – | redhatcve |
![]() | Moderate: gnutls security update | 31 Jan 202400:00 | – | osv |
![]() | CVE-2024-0553 | 16 Jan 202412:15 | – | osv |
![]() | Moderate: gnutls security update | 12 Feb 202420:17 | – | osv |
![]() | RHSA-2024:0533 Red Hat Security Advisory: gnutls security update | 16 Sep 202412:46 | – | osv |
![]() | Moderate: gnutls security update | 29 Jan 202400:00 | – | osv |
![]() | OPENSUSE-SU-2024:13444-1 gnutls-3.8.2-1.1 on GA media | 15 Jun 202400:00 | – | osv |
![]() | CVE-2023-5981 | 28 Nov 202312:15 | – | osv |
![]() | gnutls28 - security update | 22 Nov 202300:00 | – | osv |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
almalinux | 8 | i686 | gnutls | 3.6.16-8.el8_9.1 | gnutls-3.6.16-8.el8_9.1.i686.rpm |
almalinux | 8 | i686 | gnutls-dane | 3.6.16-8.el8_9.1 | gnutls-dane-3.6.16-8.el8_9.1.i686.rpm |
almalinux | 8 | i686 | gnutls-devel | 3.6.16-8.el8_9.1 | gnutls-devel-3.6.16-8.el8_9.1.i686.rpm |
almalinux | 8 | i686 | gnutls-c++ | 3.6.16-8.el8_9.1 | gnutls-c++-3.6.16-8.el8_9.1.i686.rpm |
almalinux | 8 | x86_64 | gnutls | 3.6.16-8.el8_9.1 | gnutls-3.6.16-8.el8_9.1.x86_64.rpm |
almalinux | 8 | aarch64 | gnutls | 3.6.16-8.el8_9.1 | gnutls-3.6.16-8.el8_9.1.aarch64.rpm |
almalinux | 8 | x86_64 | gnutls-utils | 3.6.16-8.el8_9.1 | gnutls-utils-3.6.16-8.el8_9.1.x86_64.rpm |
almalinux | 8 | x86_64 | gnutls-devel | 3.6.16-8.el8_9.1 | gnutls-devel-3.6.16-8.el8_9.1.x86_64.rpm |
almalinux | 8 | x86_64 | gnutls-dane | 3.6.16-8.el8_9.1 | gnutls-dane-3.6.16-8.el8_9.1.x86_64.rpm |
almalinux | 8 | x86_64 | gnutls-c++ | 3.6.16-8.el8_9.1 | gnutls-c++-3.6.16-8.el8_9.1.x86_64.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo