First published: Wed Apr 10 2024(Updated: )
Important: unbound security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/unbound | <1.16.2-3.el9_3.5 | 1.16.2-3.el9_3.5 |
redhat/python3-unbound | <1.16.2-3.el9_3.5 | 1.16.2-3.el9_3.5 |
redhat/python3-unbound-debuginfo | <1.16.2-3.el9_3.5 | 1.16.2-3.el9_3.5 |
redhat/python3-unbound-debuginfo | <1.16.2-3.el9_3.5 | 1.16.2-3.el9_3.5 |
redhat/unbound | <1.16.2-3.el9_3.5 | 1.16.2-3.el9_3.5 |
redhat/unbound-debuginfo | <1.16.2-3.el9_3.5 | 1.16.2-3.el9_3.5 |
redhat/unbound-debuginfo | <1.16.2-3.el9_3.5 | 1.16.2-3.el9_3.5 |
redhat/unbound-debugsource | <1.16.2-3.el9_3.5 | 1.16.2-3.el9_3.5 |
redhat/unbound-debugsource | <1.16.2-3.el9_3.5 | 1.16.2-3.el9_3.5 |
redhat/unbound-libs | <1.16.2-3.el9_3.5 | 1.16.2-3.el9_3.5 |
redhat/unbound-libs | <1.16.2-3.el9_3.5 | 1.16.2-3.el9_3.5 |
redhat/unbound-libs-debuginfo | <1.16.2-3.el9_3.5 | 1.16.2-3.el9_3.5 |
redhat/unbound-libs-debuginfo | <1.16.2-3.el9_3.5 | 1.16.2-3.el9_3.5 |
redhat/python3-unbound | <1.16.2-3.el9_3.5 | 1.16.2-3.el9_3.5 |
redhat/python3-unbound | <1.16.2-3.el9_3.5 | 1.16.2-3.el9_3.5 |
redhat/python3-unbound-debuginfo | <1.16.2-3.el9_3.5 | 1.16.2-3.el9_3.5 |
redhat/unbound | <1.16.2-3.el9_3.5 | 1.16.2-3.el9_3.5 |
redhat/unbound-debuginfo | <1.16.2-3.el9_3.5 | 1.16.2-3.el9_3.5 |
redhat/unbound-debugsource | <1.16.2-3.el9_3.5 | 1.16.2-3.el9_3.5 |
redhat/unbound-libs | <1.16.2-3.el9_3.5 | 1.16.2-3.el9_3.5 |
redhat/unbound-libs-debuginfo | <1.16.2-3.el9_3.5 | 1.16.2-3.el9_3.5 |
redhat/python3-unbound | <1.16.2-3.el9_3.5.aa | 1.16.2-3.el9_3.5.aa |
redhat/python3-unbound-debuginfo | <1.16.2-3.el9_3.5.aa | 1.16.2-3.el9_3.5.aa |
redhat/unbound | <1.16.2-3.el9_3.5.aa | 1.16.2-3.el9_3.5.aa |
redhat/unbound-debuginfo | <1.16.2-3.el9_3.5.aa | 1.16.2-3.el9_3.5.aa |
redhat/unbound-debugsource | <1.16.2-3.el9_3.5.aa | 1.16.2-3.el9_3.5.aa |
redhat/unbound-libs | <1.16.2-3.el9_3.5.aa | 1.16.2-3.el9_3.5.aa |
redhat/unbound-libs-debuginfo | <1.16.2-3.el9_3.5.aa | 1.16.2-3.el9_3.5.aa |
redhat/unbound-devel | <1.16.2-3.el9_3.5 | 1.16.2-3.el9_3.5 |
redhat/unbound-devel | <1.16.2-3.el9_3.5 | 1.16.2-3.el9_3.5 |
redhat/unbound-devel | <1.16.2-3.el9_3.5 | 1.16.2-3.el9_3.5 |
redhat/unbound-devel | <1.16.2-3.el9_3.5.aa | 1.16.2-3.el9_3.5.aa |
Red Hat Red Hat CodeReady Linux Builder for x86_64 | ||
Red Hat Enterprise Linux 8 | ||
Red Hat Enterprise Linux for IBM z Systems | ||
Red Hat Enterprise Linux 8 | ||
Red Hat Red Hat Enterprise Linux for Power, little endian | ||
Red Hat Red Hat CodeReady Linux Builder for Power, little endian | ||
Red Hat Red Hat CodeReady Linux Builder for IBM z Systems | ||
Red Hat Red Hat CodeReady Linux Builder for ARM 64 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:1750 is classified as important.
To fix RHSA-2024:1750, update the unbound package to version 1.16.2-3.el9_3.5.
Versions of unbound prior to 1.16.2-3.el9_3.5 are affected by RHSA-2024:1750.
The vulnerability in RHSA-2024:1750 is caused by incorrect default permissions allowing unauthorized access.
Systems running Red Hat Enterprise Linux and Red Hat CodeReady Linux Builder are impacted by RHSA-2024:1750.