First published: Thu Apr 11 2024(Updated: )
Important: unbound security and bug fix update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/unbound | <1.16.2-3.el9_2.4 | 1.16.2-3.el9_2.4 |
redhat/python3-unbound | <1.16.2-3.el9_2.4 | 1.16.2-3.el9_2.4 |
redhat/python3-unbound-debuginfo | <1.16.2-3.el9_2.4 | 1.16.2-3.el9_2.4 |
redhat/python3-unbound-debuginfo | <1.16.2-3.el9_2.4 | 1.16.2-3.el9_2.4 |
redhat/unbound | <1.16.2-3.el9_2.4 | 1.16.2-3.el9_2.4 |
redhat/unbound-debuginfo | <1.16.2-3.el9_2.4 | 1.16.2-3.el9_2.4 |
redhat/unbound-debuginfo | <1.16.2-3.el9_2.4 | 1.16.2-3.el9_2.4 |
redhat/unbound-debugsource | <1.16.2-3.el9_2.4 | 1.16.2-3.el9_2.4 |
redhat/unbound-debugsource | <1.16.2-3.el9_2.4 | 1.16.2-3.el9_2.4 |
redhat/unbound-libs | <1.16.2-3.el9_2.4 | 1.16.2-3.el9_2.4 |
redhat/unbound-libs | <1.16.2-3.el9_2.4 | 1.16.2-3.el9_2.4 |
redhat/unbound-libs-debuginfo | <1.16.2-3.el9_2.4 | 1.16.2-3.el9_2.4 |
redhat/unbound-libs-debuginfo | <1.16.2-3.el9_2.4 | 1.16.2-3.el9_2.4 |
redhat/python3-unbound | <1.16.2-3.el9_2.4 | 1.16.2-3.el9_2.4 |
redhat/python3-unbound | <1.16.2-3.el9_2.4 | 1.16.2-3.el9_2.4 |
redhat/python3-unbound-debuginfo | <1.16.2-3.el9_2.4 | 1.16.2-3.el9_2.4 |
redhat/unbound | <1.16.2-3.el9_2.4 | 1.16.2-3.el9_2.4 |
redhat/unbound-debuginfo | <1.16.2-3.el9_2.4 | 1.16.2-3.el9_2.4 |
redhat/unbound-debugsource | <1.16.2-3.el9_2.4 | 1.16.2-3.el9_2.4 |
redhat/unbound-libs | <1.16.2-3.el9_2.4 | 1.16.2-3.el9_2.4 |
redhat/unbound-libs-debuginfo | <1.16.2-3.el9_2.4 | 1.16.2-3.el9_2.4 |
redhat/python3-unbound | <1.16.2-3.el9_2.4.aa | 1.16.2-3.el9_2.4.aa |
redhat/python3-unbound-debuginfo | <1.16.2-3.el9_2.4.aa | 1.16.2-3.el9_2.4.aa |
redhat/unbound | <1.16.2-3.el9_2.4.aa | 1.16.2-3.el9_2.4.aa |
redhat/unbound-debuginfo | <1.16.2-3.el9_2.4.aa | 1.16.2-3.el9_2.4.aa |
redhat/unbound-debugsource | <1.16.2-3.el9_2.4.aa | 1.16.2-3.el9_2.4.aa |
redhat/unbound-libs | <1.16.2-3.el9_2.4.aa | 1.16.2-3.el9_2.4.aa |
redhat/unbound-libs-debuginfo | <1.16.2-3.el9_2.4.aa | 1.16.2-3.el9_2.4.aa |
redhat/unbound-devel | <1.16.2-3.el9_2.4 | 1.16.2-3.el9_2.4 |
redhat/unbound-devel | <1.16.2-3.el9_2.4 | 1.16.2-3.el9_2.4 |
redhat/unbound-devel | <1.16.2-3.el9_2.4 | 1.16.2-3.el9_2.4 |
redhat/unbound-devel | <1.16.2-3.el9_2.4.aa | 1.16.2-3.el9_2.4.aa |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | ||
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support | ||
Red Hat Enterprise Linux Server | ||
Red Hat Enterprise Linux Server | ||
Red Hat Enterprise Linux for SAP Solutions | ||
Red Hat Enterprise Linux Server for IBM z Systems | ||
Red Hat CodeReady Linux Builder for IBM z Systems | ||
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support | ||
Red Hat Enterprise Linux for IBM z Systems | ||
Red Hat Enterprise Linux for x86_64 - Extended Update Support | ||
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support | ||
Red Hat Enterprise Linux for ARM64 EUS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:1780 is classified as important.
To fix RHSA-2024:1780, you need to update the unbound package to version 1.16.2-3.el9_2.4.
RHSA-2024:1780 affects various Red Hat Enterprise Linux products across multiple architectures, including Power, x86_64, and ARM.
RHSA-2024:1780 addresses a vulnerability in Unbound due to incorrect default permissions.
A reboot may be required after applying the fix for RHSA-2024:1780, depending on the environment.