Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2024:1802 - Security Advisory
Issued:
2024-04-15
Updated:
2024-04-15

RHSA-2024:1802 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: unbound security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for unbound is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver.

Security Fix(es):

  • A vulnerability was found in Unbound due to incorrect default permissions,

allowing any process outside the unbound group to modify the unbound runtime
configuration. The default combination of the "control-use-cert: no" option with
either explicit or implicit use of an IP address in the "control-interface"
option could allow improper access. If a process can connect over localhost to
port 8953, it can alter the configuration of unbound.service. This flaw allows
an unprivileged local process to manipulate a running instance, potentially
altering forwarders, allowing them to track all queries forwarded by the local
resolver, and, in some cases, disrupting resolving altogether.

To mitigate the vulnerability, a new file
"/etc/unbound/conf.d/remote-control.conf" has been added and included in the
main unbound configuration file, "unbound.conf". The file contains two
directives that should limit access to unbound.conf:

control-interface: "/run/unbound/control"
control-use-cert: "yes"

For details about these directives, run "man unbound.conf".

Updating to the version of unbound provided by this advisory should, in most
cases, address the vulnerability. To verify that your configuration is not
vulnerable, use the "unbound-control status | grep control" command. If the
output contains "control(ssl)" or "control(namedpipe)", your configuration is
not vulnerable. If the command output returns only "control", the configuration
is vulnerable because it does not enforce access only to the unbound group
members. To fix your configuration, add the line "include:
/etc/unbound/conf.d/remote-control.conf" to the end of the file
"/etc/unbound/unbound.conf". If you use a custom
"/etc/unbound/conf.d/remote-control.conf" file, add the new directives to this
file. (CVE-2024-1488)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.8 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.8 s390x
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.8 ppc64le
  • Red Hat Enterprise Linux Server - TUS 8.8 x86_64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.8 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8 x86_64

Fixes

  • BZ - 2264183 - CVE-2024-1488 unbound: unrestricted reconfiguration enabled to anyone that may lead to local privilege escalation

CVEs

  • CVE-2024-1488

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.8

SRPM
unbound-1.16.2-5.el8_8.4.src.rpm SHA-256: 29935f09a4eac867a0df163f14b664f51d86a862749452c59576f56aecdc4557
x86_64
python3-unbound-1.16.2-5.el8_8.4.x86_64.rpm SHA-256: 07b86e328a5dfe18a4eded3fa691fa2e0b483ada97779919fd9bb25314f88ce7
python3-unbound-debuginfo-1.16.2-5.el8_8.4.i686.rpm SHA-256: 59950128aa6ad7dbe78b59bfa43e62b11fb842f5826c270ffdb31cbd3ea04edc
python3-unbound-debuginfo-1.16.2-5.el8_8.4.x86_64.rpm SHA-256: 4605e0285b59a711a78d7a9551504fcbd08a0ddf343647c6e55ed851ef8f0abe
unbound-1.16.2-5.el8_8.4.x86_64.rpm SHA-256: 0482c4dd10297c9831f497aa707a70624af4f109734516e6c75a5b38a66b027b
unbound-debuginfo-1.16.2-5.el8_8.4.i686.rpm SHA-256: 4d6dcf7b84033487409ed7facf7c14dc663cae3e7399f491d6ca9e73c89a7116
unbound-debuginfo-1.16.2-5.el8_8.4.x86_64.rpm SHA-256: 94356bcccbab87b6ec7d97110ef24269e22634ff74c74c07267d6834e370ac92
unbound-debugsource-1.16.2-5.el8_8.4.i686.rpm SHA-256: b07d1e7a1dc2d8ba9b71313f1443dd32417540c07fe3665729150c79bbb19576
unbound-debugsource-1.16.2-5.el8_8.4.x86_64.rpm SHA-256: 2cc0910bc42d9d57395bb3a78325de91540cc5ee01f94d6054138da5fbe2b6be
unbound-devel-1.16.2-5.el8_8.4.i686.rpm SHA-256: 3a0832ffe324f12e931d83f3abf36992ac2c243a3e7d84a8d53c301912665cad
unbound-devel-1.16.2-5.el8_8.4.x86_64.rpm SHA-256: babc1d2b6f2916ab8697d8e37973b085dedf9200545de6f585de154f95a89232
unbound-libs-1.16.2-5.el8_8.4.i686.rpm SHA-256: 0ad94ae61623a8bcb27a2836a798ab1dee539b40680ce71cdbd987b0dcf04572
unbound-libs-1.16.2-5.el8_8.4.x86_64.rpm SHA-256: d344f09a815a7859a2080a512404490ab0f0c214dbf1ea882186c16712d7e3b1
unbound-libs-debuginfo-1.16.2-5.el8_8.4.i686.rpm SHA-256: ddd934b6faca74e23418d9618b567cac41e1df5361d7e046514eb8eb6b90caa0
unbound-libs-debuginfo-1.16.2-5.el8_8.4.x86_64.rpm SHA-256: 201b0af0e4c5fa3708910ed2680c2043d90880286875ec5cbd49489b1a979bd4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.8

SRPM
unbound-1.16.2-5.el8_8.4.src.rpm SHA-256: 29935f09a4eac867a0df163f14b664f51d86a862749452c59576f56aecdc4557
s390x
python3-unbound-1.16.2-5.el8_8.4.s390x.rpm SHA-256: bbd39f3cb5c5bc0fc9c470d19b29f1a4c94868dd06a8e19de70b25dcf62a9fa7
python3-unbound-debuginfo-1.16.2-5.el8_8.4.s390x.rpm SHA-256: 90186816e086ff292ccc69a1a9bbc9a8faa1046aa2b42ff34d7965d7838fc81b
unbound-1.16.2-5.el8_8.4.s390x.rpm SHA-256: c2315e019957d70950d293133245c5acfd77a11949d747e167a1c721d1aef613
unbound-debuginfo-1.16.2-5.el8_8.4.s390x.rpm SHA-256: 199a92a5fee309984ee1583dbf15da49b506b74110857a5064eb076eb2d5dbb3
unbound-debugsource-1.16.2-5.el8_8.4.s390x.rpm SHA-256: fdbc3ae7b6f02194d2169cc759b8e17c3fb15fc812c98b041be0e14b231feee3
unbound-devel-1.16.2-5.el8_8.4.s390x.rpm SHA-256: a8290f5b59aea38df9b14c7c1ced2d045f5fe9fcb5a4e4f55e40a080cea74093
unbound-libs-1.16.2-5.el8_8.4.s390x.rpm SHA-256: 7a6173b60ff26404bf9738b7e0e6983a736f871c95053da8e85a2796cadb99eb
unbound-libs-debuginfo-1.16.2-5.el8_8.4.s390x.rpm SHA-256: e78cdd048bc7eda6c613bb462d4a31303a25339fe5de6e1480668d1dfd72ece1

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.8

SRPM
unbound-1.16.2-5.el8_8.4.src.rpm SHA-256: 29935f09a4eac867a0df163f14b664f51d86a862749452c59576f56aecdc4557
ppc64le
python3-unbound-1.16.2-5.el8_8.4.ppc64le.rpm SHA-256: bb9bc7b95da026d9a21fac72f43cf4e7341abcb2f398579fe3c11b2b5b1689c4
python3-unbound-debuginfo-1.16.2-5.el8_8.4.ppc64le.rpm SHA-256: f203e392c310c47742327563172252a092047f80ca5b3ff4757e17e2f1e65854
unbound-1.16.2-5.el8_8.4.ppc64le.rpm SHA-256: 67c5119640c09bc0a0a4e5881d13a895b1276ae7862e9b30ba2ce19d66ea5c99
unbound-debuginfo-1.16.2-5.el8_8.4.ppc64le.rpm SHA-256: b4d0333e3716ac8c9441e7e709f0d748e4d08cbb4f1dc800e4da4c2ef92cbbce
unbound-debugsource-1.16.2-5.el8_8.4.ppc64le.rpm SHA-256: 0bba7e6f2e5ba9fb0e2141b6ace65cee0cad889de5bab24e367d4b012911861d
unbound-devel-1.16.2-5.el8_8.4.ppc64le.rpm SHA-256: cb2dfa62ef5d1a3be6edb8746687a84a5e28d146f52f023cd2fb4c43229f2f5b
unbound-libs-1.16.2-5.el8_8.4.ppc64le.rpm SHA-256: 81187751989bc7fa2afeb1fb11c08a042e9ee84a85efce7545c504f4189de636
unbound-libs-debuginfo-1.16.2-5.el8_8.4.ppc64le.rpm SHA-256: 48b1d0df55b0c34c748937487bc1b18283bd8fb15a9473b7ea15864a9081d3a2

Red Hat Enterprise Linux Server - TUS 8.8

SRPM
unbound-1.16.2-5.el8_8.4.src.rpm SHA-256: 29935f09a4eac867a0df163f14b664f51d86a862749452c59576f56aecdc4557
x86_64
python3-unbound-1.16.2-5.el8_8.4.x86_64.rpm SHA-256: 07b86e328a5dfe18a4eded3fa691fa2e0b483ada97779919fd9bb25314f88ce7
python3-unbound-debuginfo-1.16.2-5.el8_8.4.i686.rpm SHA-256: 59950128aa6ad7dbe78b59bfa43e62b11fb842f5826c270ffdb31cbd3ea04edc
python3-unbound-debuginfo-1.16.2-5.el8_8.4.x86_64.rpm SHA-256: 4605e0285b59a711a78d7a9551504fcbd08a0ddf343647c6e55ed851ef8f0abe
unbound-1.16.2-5.el8_8.4.x86_64.rpm SHA-256: 0482c4dd10297c9831f497aa707a70624af4f109734516e6c75a5b38a66b027b
unbound-debuginfo-1.16.2-5.el8_8.4.i686.rpm SHA-256: 4d6dcf7b84033487409ed7facf7c14dc663cae3e7399f491d6ca9e73c89a7116
unbound-debuginfo-1.16.2-5.el8_8.4.x86_64.rpm SHA-256: 94356bcccbab87b6ec7d97110ef24269e22634ff74c74c07267d6834e370ac92
unbound-debugsource-1.16.2-5.el8_8.4.i686.rpm SHA-256: b07d1e7a1dc2d8ba9b71313f1443dd32417540c07fe3665729150c79bbb19576
unbound-debugsource-1.16.2-5.el8_8.4.x86_64.rpm SHA-256: 2cc0910bc42d9d57395bb3a78325de91540cc5ee01f94d6054138da5fbe2b6be
unbound-devel-1.16.2-5.el8_8.4.i686.rpm SHA-256: 3a0832ffe324f12e931d83f3abf36992ac2c243a3e7d84a8d53c301912665cad
unbound-devel-1.16.2-5.el8_8.4.x86_64.rpm SHA-256: babc1d2b6f2916ab8697d8e37973b085dedf9200545de6f585de154f95a89232
unbound-libs-1.16.2-5.el8_8.4.i686.rpm SHA-256: 0ad94ae61623a8bcb27a2836a798ab1dee539b40680ce71cdbd987b0dcf04572
unbound-libs-1.16.2-5.el8_8.4.x86_64.rpm SHA-256: d344f09a815a7859a2080a512404490ab0f0c214dbf1ea882186c16712d7e3b1
unbound-libs-debuginfo-1.16.2-5.el8_8.4.i686.rpm SHA-256: ddd934b6faca74e23418d9618b567cac41e1df5361d7e046514eb8eb6b90caa0
unbound-libs-debuginfo-1.16.2-5.el8_8.4.x86_64.rpm SHA-256: 201b0af0e4c5fa3708910ed2680c2043d90880286875ec5cbd49489b1a979bd4

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.8

SRPM
unbound-1.16.2-5.el8_8.4.src.rpm SHA-256: 29935f09a4eac867a0df163f14b664f51d86a862749452c59576f56aecdc4557
aarch64
python3-unbound-1.16.2-5.el8_8.4.aarch64.rpm SHA-256: 7e4f5c7900ab8791289ec11683b3a247b1d5933ab192e64ff141f60c1641f52a
python3-unbound-debuginfo-1.16.2-5.el8_8.4.aarch64.rpm SHA-256: ca176347a5295e89b77251c43c78e42679d4e4a8ef91f7965adbb71d2d905b9f
unbound-1.16.2-5.el8_8.4.aarch64.rpm SHA-256: 2fca79dc3b4e39d77a88665831fdd30afa1e6f84807a444bd64a9bf468fddf2a
unbound-debuginfo-1.16.2-5.el8_8.4.aarch64.rpm SHA-256: 918e0cbc15d50db2f1a20335e024f3164d118a601d5055e0cfa4aebde38166ac
unbound-debugsource-1.16.2-5.el8_8.4.aarch64.rpm SHA-256: 24e0e9b6aa959935066c82b7fea6e0521b8cc6a1eb1b888d532e53a48182312d
unbound-devel-1.16.2-5.el8_8.4.aarch64.rpm SHA-256: 3369be236af4a481a3d8673f8ce92169aa39bb5085d847edfe542c408160ae24
unbound-libs-1.16.2-5.el8_8.4.aarch64.rpm SHA-256: d4b4bff11a540024ef251d67b753d9aff71a27515a3bfbe9d21642537fc72469
unbound-libs-debuginfo-1.16.2-5.el8_8.4.aarch64.rpm SHA-256: cc61924da56b3eaf17254f9383bce575d97c86b6b0e75e2d443ea5a14e542d24

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8

SRPM
unbound-1.16.2-5.el8_8.4.src.rpm SHA-256: 29935f09a4eac867a0df163f14b664f51d86a862749452c59576f56aecdc4557
ppc64le
python3-unbound-1.16.2-5.el8_8.4.ppc64le.rpm SHA-256: bb9bc7b95da026d9a21fac72f43cf4e7341abcb2f398579fe3c11b2b5b1689c4
python3-unbound-debuginfo-1.16.2-5.el8_8.4.ppc64le.rpm SHA-256: f203e392c310c47742327563172252a092047f80ca5b3ff4757e17e2f1e65854
unbound-1.16.2-5.el8_8.4.ppc64le.rpm SHA-256: 67c5119640c09bc0a0a4e5881d13a895b1276ae7862e9b30ba2ce19d66ea5c99
unbound-debuginfo-1.16.2-5.el8_8.4.ppc64le.rpm SHA-256: b4d0333e3716ac8c9441e7e709f0d748e4d08cbb4f1dc800e4da4c2ef92cbbce
unbound-debugsource-1.16.2-5.el8_8.4.ppc64le.rpm SHA-256: 0bba7e6f2e5ba9fb0e2141b6ace65cee0cad889de5bab24e367d4b012911861d
unbound-devel-1.16.2-5.el8_8.4.ppc64le.rpm SHA-256: cb2dfa62ef5d1a3be6edb8746687a84a5e28d146f52f023cd2fb4c43229f2f5b
unbound-libs-1.16.2-5.el8_8.4.ppc64le.rpm SHA-256: 81187751989bc7fa2afeb1fb11c08a042e9ee84a85efce7545c504f4189de636
unbound-libs-debuginfo-1.16.2-5.el8_8.4.ppc64le.rpm SHA-256: 48b1d0df55b0c34c748937487bc1b18283bd8fb15a9473b7ea15864a9081d3a2

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8

SRPM
unbound-1.16.2-5.el8_8.4.src.rpm SHA-256: 29935f09a4eac867a0df163f14b664f51d86a862749452c59576f56aecdc4557
x86_64
python3-unbound-1.16.2-5.el8_8.4.x86_64.rpm SHA-256: 07b86e328a5dfe18a4eded3fa691fa2e0b483ada97779919fd9bb25314f88ce7
python3-unbound-debuginfo-1.16.2-5.el8_8.4.i686.rpm SHA-256: 59950128aa6ad7dbe78b59bfa43e62b11fb842f5826c270ffdb31cbd3ea04edc
python3-unbound-debuginfo-1.16.2-5.el8_8.4.x86_64.rpm SHA-256: 4605e0285b59a711a78d7a9551504fcbd08a0ddf343647c6e55ed851ef8f0abe
unbound-1.16.2-5.el8_8.4.x86_64.rpm SHA-256: 0482c4dd10297c9831f497aa707a70624af4f109734516e6c75a5b38a66b027b
unbound-debuginfo-1.16.2-5.el8_8.4.i686.rpm SHA-256: 4d6dcf7b84033487409ed7facf7c14dc663cae3e7399f491d6ca9e73c89a7116
unbound-debuginfo-1.16.2-5.el8_8.4.x86_64.rpm SHA-256: 94356bcccbab87b6ec7d97110ef24269e22634ff74c74c07267d6834e370ac92
unbound-debugsource-1.16.2-5.el8_8.4.i686.rpm SHA-256: b07d1e7a1dc2d8ba9b71313f1443dd32417540c07fe3665729150c79bbb19576
unbound-debugsource-1.16.2-5.el8_8.4.x86_64.rpm SHA-256: 2cc0910bc42d9d57395bb3a78325de91540cc5ee01f94d6054138da5fbe2b6be
unbound-devel-1.16.2-5.el8_8.4.i686.rpm SHA-256: 3a0832ffe324f12e931d83f3abf36992ac2c243a3e7d84a8d53c301912665cad
unbound-devel-1.16.2-5.el8_8.4.x86_64.rpm SHA-256: babc1d2b6f2916ab8697d8e37973b085dedf9200545de6f585de154f95a89232
unbound-libs-1.16.2-5.el8_8.4.i686.rpm SHA-256: 0ad94ae61623a8bcb27a2836a798ab1dee539b40680ce71cdbd987b0dcf04572
unbound-libs-1.16.2-5.el8_8.4.x86_64.rpm SHA-256: d344f09a815a7859a2080a512404490ab0f0c214dbf1ea882186c16712d7e3b1
unbound-libs-debuginfo-1.16.2-5.el8_8.4.i686.rpm SHA-256: ddd934b6faca74e23418d9618b567cac41e1df5361d7e046514eb8eb6b90caa0
unbound-libs-debuginfo-1.16.2-5.el8_8.4.x86_64.rpm SHA-256: 201b0af0e4c5fa3708910ed2680c2043d90880286875ec5cbd49489b1a979bd4

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility