First published: Mon Feb 26 2024(Updated: )
Important: unbound security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/unbound | <1.16.2-3.el9_2.1 | 1.16.2-3.el9_2.1 |
redhat/python3-unbound | <1.16.2-3.el9_2.1 | 1.16.2-3.el9_2.1 |
redhat/python3-unbound-debuginfo | <1.16.2-3.el9_2.1 | 1.16.2-3.el9_2.1 |
redhat/python3-unbound-debuginfo | <1.16.2-3.el9_2.1 | 1.16.2-3.el9_2.1 |
redhat/unbound | <1.16.2-3.el9_2.1 | 1.16.2-3.el9_2.1 |
redhat/unbound-debuginfo | <1.16.2-3.el9_2.1 | 1.16.2-3.el9_2.1 |
redhat/unbound-debuginfo | <1.16.2-3.el9_2.1 | 1.16.2-3.el9_2.1 |
redhat/unbound-debugsource | <1.16.2-3.el9_2.1 | 1.16.2-3.el9_2.1 |
redhat/unbound-debugsource | <1.16.2-3.el9_2.1 | 1.16.2-3.el9_2.1 |
redhat/unbound-libs | <1.16.2-3.el9_2.1 | 1.16.2-3.el9_2.1 |
redhat/unbound-libs | <1.16.2-3.el9_2.1 | 1.16.2-3.el9_2.1 |
redhat/unbound-libs-debuginfo | <1.16.2-3.el9_2.1 | 1.16.2-3.el9_2.1 |
redhat/unbound-libs-debuginfo | <1.16.2-3.el9_2.1 | 1.16.2-3.el9_2.1 |
redhat/python3-unbound | <1.16.2-3.el9_2.1 | 1.16.2-3.el9_2.1 |
redhat/python3-unbound | <1.16.2-3.el9_2.1 | 1.16.2-3.el9_2.1 |
redhat/python3-unbound-debuginfo | <1.16.2-3.el9_2.1 | 1.16.2-3.el9_2.1 |
redhat/unbound | <1.16.2-3.el9_2.1 | 1.16.2-3.el9_2.1 |
redhat/unbound-debuginfo | <1.16.2-3.el9_2.1 | 1.16.2-3.el9_2.1 |
redhat/unbound-debugsource | <1.16.2-3.el9_2.1 | 1.16.2-3.el9_2.1 |
redhat/unbound-libs | <1.16.2-3.el9_2.1 | 1.16.2-3.el9_2.1 |
redhat/unbound-libs-debuginfo | <1.16.2-3.el9_2.1 | 1.16.2-3.el9_2.1 |
redhat/python3-unbound | <1.16.2-3.el9_2.1.aa | 1.16.2-3.el9_2.1.aa |
redhat/python3-unbound-debuginfo | <1.16.2-3.el9_2.1.aa | 1.16.2-3.el9_2.1.aa |
redhat/unbound | <1.16.2-3.el9_2.1.aa | 1.16.2-3.el9_2.1.aa |
redhat/unbound-debuginfo | <1.16.2-3.el9_2.1.aa | 1.16.2-3.el9_2.1.aa |
redhat/unbound-debugsource | <1.16.2-3.el9_2.1.aa | 1.16.2-3.el9_2.1.aa |
redhat/unbound-libs | <1.16.2-3.el9_2.1.aa | 1.16.2-3.el9_2.1.aa |
redhat/unbound-libs-debuginfo | <1.16.2-3.el9_2.1.aa | 1.16.2-3.el9_2.1.aa |
redhat/unbound-devel | <1.16.2-3.el9_2.1 | 1.16.2-3.el9_2.1 |
redhat/unbound-devel | <1.16.2-3.el9_2.1 | 1.16.2-3.el9_2.1 |
redhat/unbound-devel | <1.16.2-3.el9_2.1 | 1.16.2-3.el9_2.1 |
redhat/unbound-devel | <1.16.2-3.el9_2.1.aa | 1.16.2-3.el9_2.1.aa |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | ||
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support | ||
Red Hat Enterprise Linux for x86_64 - Extended Update Support | ||
Red Hat Enterprise Linux Server | ||
Red Hat Enterprise Linux Server | ||
Red Hat Enterprise Linux for SAP Solutions | ||
Red Hat Enterprise Linux for IBM z Systems | ||
Red Hat Enterprise Linux Server for IBM z Systems | ||
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support | ||
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support | ||
Red Hat CodeReady Linux Builder for IBM z Systems | ||
Red Hat Enterprise Linux for ARM64 EUS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2024:0981 has been classified as important due to the potential for extreme CPU consumption by the DNSSEC validator.
To fix RHSA-2024:0981, update the unbound package to version 1.16.2-3.el9_2.1 or later.
RHSA-2024:0981 affects multiple Red Hat Enterprise Linux systems including versions for x86_64, ARM, and Power architectures.
RHSA-2024:0981 addresses an issue with extreme CPU consumption in the DNSSEC validator, identified as CVE-2023-50387.
Yes, you need to install unbound version 1.16.2-3.el9_2.1 to mitigate the vulnerabilities associated with RHSA-2024:0981.