First published: Wed Feb 19 2025(Updated: )
Important: bind security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/bind | <9.8.2-0.68.rc1.el6_10.15 | 9.8.2-0.68.rc1.el6_10.15 |
redhat/bind | <9.8.2-0.68.rc1.el6_10.15 | 9.8.2-0.68.rc1.el6_10.15 |
redhat/bind-chroot | <9.8.2-0.68.rc1.el6_10.15 | 9.8.2-0.68.rc1.el6_10.15 |
redhat/bind-debuginfo | <9.8.2-0.68.rc1.el6_10.15 | 9.8.2-0.68.rc1.el6_10.15 |
redhat/bind-debuginfo | <9.8.2-0.68.rc1.el6_10.15 | 9.8.2-0.68.rc1.el6_10.15 |
redhat/bind-devel | <9.8.2-0.68.rc1.el6_10.15 | 9.8.2-0.68.rc1.el6_10.15 |
redhat/bind-devel | <9.8.2-0.68.rc1.el6_10.15 | 9.8.2-0.68.rc1.el6_10.15 |
redhat/bind-libs | <9.8.2-0.68.rc1.el6_10.15 | 9.8.2-0.68.rc1.el6_10.15 |
redhat/bind-libs | <9.8.2-0.68.rc1.el6_10.15 | 9.8.2-0.68.rc1.el6_10.15 |
redhat/bind-sdb | <9.8.2-0.68.rc1.el6_10.15 | 9.8.2-0.68.rc1.el6_10.15 |
redhat/bind-utils | <9.8.2-0.68.rc1.el6_10.15 | 9.8.2-0.68.rc1.el6_10.15 |
redhat/bind-chroot | <9.8.2-0.68.rc1.el6_10.15 | 9.8.2-0.68.rc1.el6_10.15 |
redhat/bind-sdb | <9.8.2-0.68.rc1.el6_10.15 | 9.8.2-0.68.rc1.el6_10.15 |
redhat/bind-utils | <9.8.2-0.68.rc1.el6_10.15 | 9.8.2-0.68.rc1.el6_10.15 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) | ||
Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2025:1685 is classified as important.
To fix RHSA-2025:1685, upgrade the affected BIND packages to version 9.8.2-0.68.rc1.el6_10.15.
The affected software for RHSA-2025:1685 includes BIND and its related packages such as bind-devel and bind-utils.
RHSA-2025:1685 addresses security vulnerabilities in the BIND implementation of the DNS protocols.
Yes, you should upgrade to version 9.8.2-0.68.rc1.el6_10.15 to mitigate the vulnerability described in RHSA-2025:1685.