First published: Mon Feb 26 2024(Updated: )
Important: unbound security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/unbound | <1.16.2-3.el9_3.1 | 1.16.2-3.el9_3.1 |
redhat/python3-unbound | <1.16.2-3.el9_3.1 | 1.16.2-3.el9_3.1 |
redhat/python3-unbound-debuginfo | <1.16.2-3.el9_3.1 | 1.16.2-3.el9_3.1 |
redhat/python3-unbound-debuginfo | <1.16.2-3.el9_3.1 | 1.16.2-3.el9_3.1 |
redhat/unbound | <1.16.2-3.el9_3.1 | 1.16.2-3.el9_3.1 |
redhat/unbound-debuginfo | <1.16.2-3.el9_3.1 | 1.16.2-3.el9_3.1 |
redhat/unbound-debuginfo | <1.16.2-3.el9_3.1 | 1.16.2-3.el9_3.1 |
redhat/unbound-debugsource | <1.16.2-3.el9_3.1 | 1.16.2-3.el9_3.1 |
redhat/unbound-debugsource | <1.16.2-3.el9_3.1 | 1.16.2-3.el9_3.1 |
redhat/unbound-libs | <1.16.2-3.el9_3.1 | 1.16.2-3.el9_3.1 |
redhat/unbound-libs | <1.16.2-3.el9_3.1 | 1.16.2-3.el9_3.1 |
redhat/unbound-libs-debuginfo | <1.16.2-3.el9_3.1 | 1.16.2-3.el9_3.1 |
redhat/unbound-libs-debuginfo | <1.16.2-3.el9_3.1 | 1.16.2-3.el9_3.1 |
redhat/python3-unbound | <1.16.2-3.el9_3.1 | 1.16.2-3.el9_3.1 |
redhat/python3-unbound | <1.16.2-3.el9_3.1 | 1.16.2-3.el9_3.1 |
redhat/python3-unbound-debuginfo | <1.16.2-3.el9_3.1 | 1.16.2-3.el9_3.1 |
redhat/unbound | <1.16.2-3.el9_3.1 | 1.16.2-3.el9_3.1 |
redhat/unbound-debuginfo | <1.16.2-3.el9_3.1 | 1.16.2-3.el9_3.1 |
redhat/unbound-debugsource | <1.16.2-3.el9_3.1 | 1.16.2-3.el9_3.1 |
redhat/unbound-libs | <1.16.2-3.el9_3.1 | 1.16.2-3.el9_3.1 |
redhat/unbound-libs-debuginfo | <1.16.2-3.el9_3.1 | 1.16.2-3.el9_3.1 |
redhat/python3-unbound | <1.16.2-3.el9_3.1.aa | 1.16.2-3.el9_3.1.aa |
redhat/python3-unbound-debuginfo | <1.16.2-3.el9_3.1.aa | 1.16.2-3.el9_3.1.aa |
redhat/unbound | <1.16.2-3.el9_3.1.aa | 1.16.2-3.el9_3.1.aa |
redhat/unbound-debuginfo | <1.16.2-3.el9_3.1.aa | 1.16.2-3.el9_3.1.aa |
redhat/unbound-debugsource | <1.16.2-3.el9_3.1.aa | 1.16.2-3.el9_3.1.aa |
redhat/unbound-libs | <1.16.2-3.el9_3.1.aa | 1.16.2-3.el9_3.1.aa |
redhat/unbound-libs-debuginfo | <1.16.2-3.el9_3.1.aa | 1.16.2-3.el9_3.1.aa |
redhat/unbound-devel | <1.16.2-3.el9_3.1 | 1.16.2-3.el9_3.1 |
redhat/unbound-devel | <1.16.2-3.el9_3.1 | 1.16.2-3.el9_3.1 |
redhat/unbound-devel | <1.16.2-3.el9_3.1 | 1.16.2-3.el9_3.1 |
redhat/unbound-devel | <1.16.2-3.el9_3.1.aa | 1.16.2-3.el9_3.1.aa |
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support | ||
Red Hat Enterprise Linux 8 | ||
Red Hat Enterprise Linux Server for IBM z Systems | ||
Red Hat Enterprise Linux for ARM 64 | ||
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
Red Hat CodeReady Linux Builder for IBM z Systems | ||
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support | ||
Red Hat CodeReady Linux Builder for ARM 64 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:0977 is classified as important.
To fix RHSA-2024:0977, update the unbound packages to version 1.16.2-3.el9_3.1.
RHSA-2024:0977 addresses extreme CPU consumption in the DNSSEC validator related to CVE-2023-50387.
Affected products include Red Hat Enterprise Linux for x86_64, IBM z Systems, ARM 64, Power little endian, and Red Hat CodeReady Linux Builder.
Yes, RHSA-2024:0977 is a contemporary security update related to recent vulnerabilities in the unbound packages.