First published: Thu Dec 12 2024(Updated: )
Important: unbound security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/unbound | <1.6.6-5.el7_9.1 | 1.6.6-5.el7_9.1 |
redhat/unbound | <1.6.6-5.el7_9.1 | 1.6.6-5.el7_9.1 |
redhat/unbound-debuginfo | <1.6.6-5.el7_9.1 | 1.6.6-5.el7_9.1 |
redhat/unbound-debuginfo | <1.6.6-5.el7_9.1 | 1.6.6-5.el7_9.1 |
redhat/unbound-devel | <1.6.6-5.el7_9.1 | 1.6.6-5.el7_9.1 |
redhat/unbound-devel | <1.6.6-5.el7_9.1 | 1.6.6-5.el7_9.1 |
redhat/unbound-libs | <1.6.6-5.el7_9.1 | 1.6.6-5.el7_9.1 |
redhat/unbound-libs | <1.6.6-5.el7_9.1 | 1.6.6-5.el7_9.1 |
redhat/unbound-python | <1.6.6-5.el7_9.1 | 1.6.6-5.el7_9.1 |
redhat/unbound-python | <1.6.6-5.el7_9.1 | 1.6.6-5.el7_9.1 |
redhat/unbound | <1.6.6-5.el7_9.1 | 1.6.6-5.el7_9.1 |
redhat/unbound-debuginfo | <1.6.6-5.el7_9.1 | 1.6.6-5.el7_9.1 |
redhat/unbound-devel | <1.6.6-5.el7_9.1 | 1.6.6-5.el7_9.1 |
redhat/unbound-libs | <1.6.6-5.el7_9.1 | 1.6.6-5.el7_9.1 |
redhat/unbound-python | <1.6.6-5.el7_9.1 | 1.6.6-5.el7_9.1 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) | ||
Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, little endian | ||
Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) | ||
Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, big endian |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:11003 is classified as important.
RHSA-2024:11003 addresses vulnerabilities including CVE-2023-50387 which causes extreme CPU consumption in the DNSSEC validator.
To fix RHSA-2024:11003, update the unbound package to version 1.6.6-5.el7_9.1.
RHSA-2024:11003 affects multiple variants of Red Hat Enterprise Linux Server, including Extended Life Cycle Support for various architectures.
Generally, a restart of the unbound service is recommended after applying the fix for RHSA-2024:11003.