First published: Wed Feb 19 2025(Updated: )
Important: bind9.16 security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/bind9.16 | <9.16.23-0.7.el8_6.8 | 9.16.23-0.7.el8_6.8 |
redhat/bind9.16 | <9.16.23-0.7.el8_6.8 | 9.16.23-0.7.el8_6.8 |
redhat/bind9.16-chroot | <9.16.23-0.7.el8_6.8 | 9.16.23-0.7.el8_6.8 |
redhat/bind9.16-debuginfo | <9.16.23-0.7.el8_6.8 | 9.16.23-0.7.el8_6.8 |
redhat/bind9.16-debugsource | <9.16.23-0.7.el8_6.8 | 9.16.23-0.7.el8_6.8 |
redhat/bind9.16-dnssec-utils-debuginfo | <9.16.23-0.7.el8_6.8 | 9.16.23-0.7.el8_6.8 |
redhat/bind9.16-libs | <9.16.23-0.7.el8_6.8 | 9.16.23-0.7.el8_6.8 |
redhat/bind9.16-libs-debuginfo | <9.16.23-0.7.el8_6.8 | 9.16.23-0.7.el8_6.8 |
redhat/bind9.16-license | <9.16.23-0.7.el8_6.8 | 9.16.23-0.7.el8_6.8 |
redhat/bind9.16-utils | <9.16.23-0.7.el8_6.8 | 9.16.23-0.7.el8_6.8 |
redhat/bind9.16-utils-debuginfo | <9.16.23-0.7.el8_6.8 | 9.16.23-0.7.el8_6.8 |
redhat/bind9.16 | <9.16.23-0.7.el8_6.8 | 9.16.23-0.7.el8_6.8 |
redhat/bind9.16-chroot | <9.16.23-0.7.el8_6.8 | 9.16.23-0.7.el8_6.8 |
redhat/bind9.16-debuginfo | <9.16.23-0.7.el8_6.8 | 9.16.23-0.7.el8_6.8 |
redhat/bind9.16-debugsource | <9.16.23-0.7.el8_6.8 | 9.16.23-0.7.el8_6.8 |
redhat/bind9.16-dnssec-utils-debuginfo | <9.16.23-0.7.el8_6.8 | 9.16.23-0.7.el8_6.8 |
redhat/bind9.16-libs | <9.16.23-0.7.el8_6.8 | 9.16.23-0.7.el8_6.8 |
redhat/bind9.16-libs-debuginfo | <9.16.23-0.7.el8_6.8 | 9.16.23-0.7.el8_6.8 |
redhat/bind9.16-utils | <9.16.23-0.7.el8_6.8 | 9.16.23-0.7.el8_6.8 |
redhat/bind9.16-utils-debuginfo | <9.16.23-0.7.el8_6.8 | 9.16.23-0.7.el8_6.8 |
Red Hat Enterprise Linux for SAP Solutions | ||
Red Hat Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | ||
Red Hat Enterprise Linux Server | ||
Red Hat Enterprise Linux Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2025:1679 is classified as important.
To address RHSA-2025:1679, update the bind9.16 package to version 9.16.23-0.7.el8_6.8.
RHSA-2025:1679 affects the bind9.16 package across various architectures.
There are no official workarounds provided for RHSA-2025:1679; upgrading is recommended.
RHSA-2025:1679 addresses security vulnerabilities within the BIND DNS server implementation.