First published: Wed Feb 19 2025(Updated: )
Important: bind security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/bind | <9.16.23-24.el9_5.3 | 9.16.23-24.el9_5.3 |
redhat/bind | <9.16.23-24.el9_5.3 | 9.16.23-24.el9_5.3 |
redhat/bind-chroot | <9.16.23-24.el9_5.3 | 9.16.23-24.el9_5.3 |
redhat/bind-debuginfo | <9.16.23-24.el9_5.3 | 9.16.23-24.el9_5.3 |
redhat/bind-debugsource | <9.16.23-24.el9_5.3 | 9.16.23-24.el9_5.3 |
redhat/bind-dnssec-doc | <9.16.23-24.el9_5.3 | 9.16.23-24.el9_5.3 |
redhat/bind-dnssec-utils | <9.16.23-24.el9_5.3 | 9.16.23-24.el9_5.3 |
redhat/bind-dnssec-utils-debuginfo | <9.16.23-24.el9_5.3 | 9.16.23-24.el9_5.3 |
redhat/bind-libs | <9.16.23-24.el9_5.3 | 9.16.23-24.el9_5.3 |
redhat/bind-libs-debuginfo | <9.16.23-24.el9_5.3 | 9.16.23-24.el9_5.3 |
redhat/bind-license | <9.16.23-24.el9_5.3 | 9.16.23-24.el9_5.3 |
redhat/bind-utils | <9.16.23-24.el9_5.3 | 9.16.23-24.el9_5.3 |
redhat/bind-utils-debuginfo | <9.16.23-24.el9_5.3 | 9.16.23-24.el9_5.3 |
redhat/python3-bind | <9.16.23-24.el9_5.3 | 9.16.23-24.el9_5.3 |
redhat/bind-chroot | <9.16.23-24.el9_5.3 | 9.16.23-24.el9_5.3 |
redhat/bind-debuginfo | <9.16.23-24.el9_5.3 | 9.16.23-24.el9_5.3 |
redhat/bind-debugsource | <9.16.23-24.el9_5.3 | 9.16.23-24.el9_5.3 |
redhat/bind-dnssec-utils | <9.16.23-24.el9_5.3 | 9.16.23-24.el9_5.3 |
redhat/bind-dnssec-utils-debuginfo | <9.16.23-24.el9_5.3 | 9.16.23-24.el9_5.3 |
redhat/bind-libs | <9.16.23-24.el9_5.3 | 9.16.23-24.el9_5.3 |
redhat/bind-libs-debuginfo | <9.16.23-24.el9_5.3 | 9.16.23-24.el9_5.3 |
redhat/bind-utils | <9.16.23-24.el9_5.3 | 9.16.23-24.el9_5.3 |
redhat/bind-utils-debuginfo | <9.16.23-24.el9_5.3 | 9.16.23-24.el9_5.3 |
redhat/bind | <9.16.23-24.el9_5.3 | 9.16.23-24.el9_5.3 |
redhat/bind-chroot | <9.16.23-24.el9_5.3 | 9.16.23-24.el9_5.3 |
redhat/bind-debuginfo | <9.16.23-24.el9_5.3 | 9.16.23-24.el9_5.3 |
redhat/bind-debugsource | <9.16.23-24.el9_5.3 | 9.16.23-24.el9_5.3 |
redhat/bind-dnssec-utils | <9.16.23-24.el9_5.3 | 9.16.23-24.el9_5.3 |
redhat/bind-dnssec-utils-debuginfo | <9.16.23-24.el9_5.3 | 9.16.23-24.el9_5.3 |
redhat/bind-libs | <9.16.23-24.el9_5.3 | 9.16.23-24.el9_5.3 |
redhat/bind-libs-debuginfo | <9.16.23-24.el9_5.3 | 9.16.23-24.el9_5.3 |
redhat/bind-utils | <9.16.23-24.el9_5.3 | 9.16.23-24.el9_5.3 |
redhat/bind-utils-debuginfo | <9.16.23-24.el9_5.3 | 9.16.23-24.el9_5.3 |
redhat/bind | <9.16.23-24.el9_5.3.aa | 9.16.23-24.el9_5.3.aa |
redhat/bind-chroot | <9.16.23-24.el9_5.3.aa | 9.16.23-24.el9_5.3.aa |
redhat/bind-debuginfo | <9.16.23-24.el9_5.3.aa | 9.16.23-24.el9_5.3.aa |
redhat/bind-debugsource | <9.16.23-24.el9_5.3.aa | 9.16.23-24.el9_5.3.aa |
redhat/bind-dnssec-utils | <9.16.23-24.el9_5.3.aa | 9.16.23-24.el9_5.3.aa |
redhat/bind-dnssec-utils-debuginfo | <9.16.23-24.el9_5.3.aa | 9.16.23-24.el9_5.3.aa |
redhat/bind-libs | <9.16.23-24.el9_5.3.aa | 9.16.23-24.el9_5.3.aa |
redhat/bind-libs-debuginfo | <9.16.23-24.el9_5.3.aa | 9.16.23-24.el9_5.3.aa |
redhat/bind-utils | <9.16.23-24.el9_5.3.aa | 9.16.23-24.el9_5.3.aa |
redhat/bind-utils-debuginfo | <9.16.23-24.el9_5.3.aa | 9.16.23-24.el9_5.3.aa |
redhat/bind-devel | <9.16.23-24.el9_5.3 | 9.16.23-24.el9_5.3 |
redhat/bind-devel | <9.16.23-24.el9_5.3 | 9.16.23-24.el9_5.3 |
redhat/bind-doc | <9.16.23-24.el9_5.3 | 9.16.23-24.el9_5.3 |
redhat/bind-devel | <9.16.23-24.el9_5.3 | 9.16.23-24.el9_5.3 |
redhat/bind-devel | <9.16.23-24.el9_5.3.aa | 9.16.23-24.el9_5.3.aa |
Red Hat Red Hat CodeReady Linux Builder for x86_64 | ||
Red Hat Enterprise Linux 8 | ||
Red Hat Enterprise Linux for IBM z Systems | ||
Red Hat Enterprise Linux 8 | ||
Red Hat Red Hat Enterprise Linux for Power, little endian | ||
Red Hat Red Hat CodeReady Linux Builder for Power, little endian | ||
Red Hat Red Hat CodeReady Linux Builder for ARM 64 | ||
Red Hat Red Hat CodeReady Linux Builder for IBM z Systems |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2025:1681 is classified as important.
To fix RHSA-2025:1681, upgrade to BIND version 9.16.23-24.el9_5.3 or later.
RHSA-2025:1681 affects several Red Hat Enterprise Linux products, including BIND and its related packages.
There are no publicly documented workarounds for RHSA-2025:1681, so the recommended action is to apply the update.
RHSA-2025:1681 was released by Red Hat on the specified advisory date.