Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2024:1804 - Security Advisory
Issued:
2024-04-15
Updated:
2024-04-15

RHSA-2024:1804 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: unbound security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for unbound is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver.

Security Fix(es):

  • bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator (CVE-2023-50387)
  • bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources (CVE-2023-50868)

Security Fix(es):

  • A vulnerability was found in Unbound due to incorrect default permissions,

allowing any process outside the unbound group to modify the unbound runtime
configuration. The default combination of the "control-use-cert: no" option with
either explicit or implicit use of an IP address in the "control-interface"
option could allow improper access. If a process can connect over localhost to
port 8953, it can alter the configuration of unbound.service. This flaw allows
an unprivileged local process to manipulate a running instance, potentially
altering forwarders, allowing them to track all queries forwarded by the local
resolver, and, in some cases, disrupting resolving altogether.

To mitigate the vulnerability, a new file
"/etc/unbound/conf.d/remote-control.conf" has been added and included in the
main unbound configuration file, "unbound.conf". The file contains two
directives that should limit access to unbound.conf:

control-interface: "/run/unbound/control"
control-use-cert: "yes"

For details about these directives, run "man unbound.conf".

Updating to the version of unbound provided by this advisory should, in most
cases, address the vulnerability. To verify that your configuration is not
vulnerable, use the "unbound-control status | grep control" command. If the
output contains "control(ssl)" or "control(namedpipe)", your configuration is
not vulnerable. If the command output returns only "control", the configuration
is vulnerable because it does not enforce access only to the unbound group
members. To fix your configuration, add the line "include:
/etc/unbound/conf.d/remote-control.conf" to the end of the file
"/etc/unbound/unbound.conf". If you use a custom
"/etc/unbound/conf.d/remote-control.conf" file, add the new directives to this
file. (CVE-2024-1488)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.6 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
  • Red Hat Enterprise Linux Server - TUS 8.6 x86_64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64

Fixes

  • BZ - 2263914 - CVE-2023-50387 bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator
  • BZ - 2263917 - CVE-2023-50868 bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources
  • BZ - 2264183 - CVE-2024-1488 unbound: unrestricted reconfiguration enabled to anyone that may lead to local privilege escalation

CVEs

  • CVE-2023-50387
  • CVE-2023-50868
  • CVE-2024-1488

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6

SRPM
unbound-1.7.3-17.el8_6.4.src.rpm SHA-256: ef8a297facf1a3a37146e85a2ab44f2e0764b34fa795a6733a046e3d5a92fb7b
x86_64
python3-unbound-1.7.3-17.el8_6.4.x86_64.rpm SHA-256: f25b68c2229c957d96953678bed6723f29a17f64e66b2d2d376973e13f5e017e
python3-unbound-debuginfo-1.7.3-17.el8_6.4.i686.rpm SHA-256: cb64683ec86b748c0940a418d9105e18736cda5b275d6e557e6f7476508c1da1
python3-unbound-debuginfo-1.7.3-17.el8_6.4.x86_64.rpm SHA-256: 9b7b36bac0fa6bd2b81e5d935d18ec544d7cf9686d93946a9bada752ad0927bd
unbound-1.7.3-17.el8_6.4.x86_64.rpm SHA-256: 02ada8135e4da820eaadc3ab3f83d2d3e5c70c796424e9524b418533d6ebbb98
unbound-debuginfo-1.7.3-17.el8_6.4.i686.rpm SHA-256: 0af0360dc7570c58b306ca13e9a22bfe0b73c6f11e0c9889f1ad24b70dcd2114
unbound-debuginfo-1.7.3-17.el8_6.4.x86_64.rpm SHA-256: b8301810d878d4c71c998bca4b43f3914d6d69f3793b8291f3facea7cd8138b1
unbound-debugsource-1.7.3-17.el8_6.4.i686.rpm SHA-256: 5c7258dde7beed6a395339d9621158e95438976903394dc7c25fb4acf7d969b0
unbound-debugsource-1.7.3-17.el8_6.4.x86_64.rpm SHA-256: 63c77d3e3e1aa2da875345615333ae55b980fbf53a7843cfb31c6b1d35aadad1
unbound-devel-1.7.3-17.el8_6.4.i686.rpm SHA-256: dbce66978f3a82581ed01d13a9d88b8bfed80002d3268c1a8ec45adf4f5ee3ff
unbound-devel-1.7.3-17.el8_6.4.x86_64.rpm SHA-256: b01403e5611579c53f101db29d14a3eb81d0e0fca2b12a13b77900b38e239bda
unbound-libs-1.7.3-17.el8_6.4.i686.rpm SHA-256: 1b6d22a225d91a015b402e2f4e9547134f650c2ec649d54e69664dc4ca834c3d
unbound-libs-1.7.3-17.el8_6.4.x86_64.rpm SHA-256: beb52ef7e1e75ec7cf334b7e01269256f7d39d0adf92463fc6a8f49246f83b32
unbound-libs-debuginfo-1.7.3-17.el8_6.4.i686.rpm SHA-256: a8ae8552c5c36395e8059417b4659cb4f190f7f9b8e581fb5bf0742fcf95a57d
unbound-libs-debuginfo-1.7.3-17.el8_6.4.x86_64.rpm SHA-256: 999b8b292cf9d65479d633ff089c6da5297e52d1be480eea5e11beea45b4ed26

Red Hat Enterprise Linux Server - AUS 8.6

SRPM
unbound-1.7.3-17.el8_6.4.src.rpm SHA-256: ef8a297facf1a3a37146e85a2ab44f2e0764b34fa795a6733a046e3d5a92fb7b
x86_64
python3-unbound-1.7.3-17.el8_6.4.x86_64.rpm SHA-256: f25b68c2229c957d96953678bed6723f29a17f64e66b2d2d376973e13f5e017e
python3-unbound-debuginfo-1.7.3-17.el8_6.4.i686.rpm SHA-256: cb64683ec86b748c0940a418d9105e18736cda5b275d6e557e6f7476508c1da1
python3-unbound-debuginfo-1.7.3-17.el8_6.4.x86_64.rpm SHA-256: 9b7b36bac0fa6bd2b81e5d935d18ec544d7cf9686d93946a9bada752ad0927bd
unbound-1.7.3-17.el8_6.4.x86_64.rpm SHA-256: 02ada8135e4da820eaadc3ab3f83d2d3e5c70c796424e9524b418533d6ebbb98
unbound-debuginfo-1.7.3-17.el8_6.4.i686.rpm SHA-256: 0af0360dc7570c58b306ca13e9a22bfe0b73c6f11e0c9889f1ad24b70dcd2114
unbound-debuginfo-1.7.3-17.el8_6.4.x86_64.rpm SHA-256: b8301810d878d4c71c998bca4b43f3914d6d69f3793b8291f3facea7cd8138b1
unbound-debugsource-1.7.3-17.el8_6.4.i686.rpm SHA-256: 5c7258dde7beed6a395339d9621158e95438976903394dc7c25fb4acf7d969b0
unbound-debugsource-1.7.3-17.el8_6.4.x86_64.rpm SHA-256: 63c77d3e3e1aa2da875345615333ae55b980fbf53a7843cfb31c6b1d35aadad1
unbound-devel-1.7.3-17.el8_6.4.i686.rpm SHA-256: dbce66978f3a82581ed01d13a9d88b8bfed80002d3268c1a8ec45adf4f5ee3ff
unbound-devel-1.7.3-17.el8_6.4.x86_64.rpm SHA-256: b01403e5611579c53f101db29d14a3eb81d0e0fca2b12a13b77900b38e239bda
unbound-libs-1.7.3-17.el8_6.4.i686.rpm SHA-256: 1b6d22a225d91a015b402e2f4e9547134f650c2ec649d54e69664dc4ca834c3d
unbound-libs-1.7.3-17.el8_6.4.x86_64.rpm SHA-256: beb52ef7e1e75ec7cf334b7e01269256f7d39d0adf92463fc6a8f49246f83b32
unbound-libs-debuginfo-1.7.3-17.el8_6.4.i686.rpm SHA-256: a8ae8552c5c36395e8059417b4659cb4f190f7f9b8e581fb5bf0742fcf95a57d
unbound-libs-debuginfo-1.7.3-17.el8_6.4.x86_64.rpm SHA-256: 999b8b292cf9d65479d633ff089c6da5297e52d1be480eea5e11beea45b4ed26

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6

SRPM
unbound-1.7.3-17.el8_6.4.src.rpm SHA-256: ef8a297facf1a3a37146e85a2ab44f2e0764b34fa795a6733a046e3d5a92fb7b
s390x
python3-unbound-1.7.3-17.el8_6.4.s390x.rpm SHA-256: b15257a50c8063235acab59660c5ac8ce81f3b5b1015085821d82ad15adb2d69
python3-unbound-debuginfo-1.7.3-17.el8_6.4.s390x.rpm SHA-256: 30269339a326480f2cbd6f1f37967841d169d55aced9dfc93a80a5938712746f
unbound-1.7.3-17.el8_6.4.s390x.rpm SHA-256: acfd27d2547552723b9767acaf38ef083bd171a04e2172f8e4edc87c28b52d4e
unbound-debuginfo-1.7.3-17.el8_6.4.s390x.rpm SHA-256: 37ab2b4be3e4dbf979517dbb333abe1e2b1e583cb2bc902e794fb82b5bdcba41
unbound-debugsource-1.7.3-17.el8_6.4.s390x.rpm SHA-256: f0fd48248e1d54a4abdd0ce353a00756eb0fc2be93d74fd44d48de7ad4fd22fb
unbound-devel-1.7.3-17.el8_6.4.s390x.rpm SHA-256: 9ab15873d32aaad969e12acefec4d3a89c38b6ae3beed058b7dd746b70ca4b95
unbound-libs-1.7.3-17.el8_6.4.s390x.rpm SHA-256: 52a771300cfbf3dce2d39c4d5166c946b01877874c5066b34880bcaa2b811b9f
unbound-libs-debuginfo-1.7.3-17.el8_6.4.s390x.rpm SHA-256: 984b6803b73b6ab88e55051900c6882be169e7abfa92d1ca15c17035c61c7b5c

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6

SRPM
unbound-1.7.3-17.el8_6.4.src.rpm SHA-256: ef8a297facf1a3a37146e85a2ab44f2e0764b34fa795a6733a046e3d5a92fb7b
ppc64le
python3-unbound-1.7.3-17.el8_6.4.ppc64le.rpm SHA-256: 02e931b92b5f4ab7e1719e7f6d535ad171f7b968602d979ba0b03a2f296b0fb7
python3-unbound-debuginfo-1.7.3-17.el8_6.4.ppc64le.rpm SHA-256: c1fef3b29f3087275184a2cbca8fef1009e61062c45ce036c3d9f1bb0f3854a7
unbound-1.7.3-17.el8_6.4.ppc64le.rpm SHA-256: b8b239589f5c17e3bc2695623930aacae684d5b838fbcda8664a2c0661dc9894
unbound-debuginfo-1.7.3-17.el8_6.4.ppc64le.rpm SHA-256: 44f82d1877cb23e883dcca12351a70074b88e24fc21e316c84e2ed3ecbfc23da
unbound-debugsource-1.7.3-17.el8_6.4.ppc64le.rpm SHA-256: c3445c117fa12b6400389ef826a8c7cffd6ae423d787091abb59b760c0e65825
unbound-devel-1.7.3-17.el8_6.4.ppc64le.rpm SHA-256: 21d87430f3bff9a38e2218116bd46dad0b31f18c0903398b154d45e7d35f6fbe
unbound-libs-1.7.3-17.el8_6.4.ppc64le.rpm SHA-256: 6d872f5d37ec37b75591a9075cc83bad66c0ca63819547f7829556b7af64c7d8
unbound-libs-debuginfo-1.7.3-17.el8_6.4.ppc64le.rpm SHA-256: 4341c756155d7d8f8c95b786196fbbe15605d93bbd3775a67e7289aa605f91af

Red Hat Enterprise Linux Server - TUS 8.6

SRPM
unbound-1.7.3-17.el8_6.4.src.rpm SHA-256: ef8a297facf1a3a37146e85a2ab44f2e0764b34fa795a6733a046e3d5a92fb7b
x86_64
python3-unbound-1.7.3-17.el8_6.4.x86_64.rpm SHA-256: f25b68c2229c957d96953678bed6723f29a17f64e66b2d2d376973e13f5e017e
python3-unbound-debuginfo-1.7.3-17.el8_6.4.i686.rpm SHA-256: cb64683ec86b748c0940a418d9105e18736cda5b275d6e557e6f7476508c1da1
python3-unbound-debuginfo-1.7.3-17.el8_6.4.x86_64.rpm SHA-256: 9b7b36bac0fa6bd2b81e5d935d18ec544d7cf9686d93946a9bada752ad0927bd
unbound-1.7.3-17.el8_6.4.x86_64.rpm SHA-256: 02ada8135e4da820eaadc3ab3f83d2d3e5c70c796424e9524b418533d6ebbb98
unbound-debuginfo-1.7.3-17.el8_6.4.i686.rpm SHA-256: 0af0360dc7570c58b306ca13e9a22bfe0b73c6f11e0c9889f1ad24b70dcd2114
unbound-debuginfo-1.7.3-17.el8_6.4.x86_64.rpm SHA-256: b8301810d878d4c71c998bca4b43f3914d6d69f3793b8291f3facea7cd8138b1
unbound-debugsource-1.7.3-17.el8_6.4.i686.rpm SHA-256: 5c7258dde7beed6a395339d9621158e95438976903394dc7c25fb4acf7d969b0
unbound-debugsource-1.7.3-17.el8_6.4.x86_64.rpm SHA-256: 63c77d3e3e1aa2da875345615333ae55b980fbf53a7843cfb31c6b1d35aadad1
unbound-devel-1.7.3-17.el8_6.4.i686.rpm SHA-256: dbce66978f3a82581ed01d13a9d88b8bfed80002d3268c1a8ec45adf4f5ee3ff
unbound-devel-1.7.3-17.el8_6.4.x86_64.rpm SHA-256: b01403e5611579c53f101db29d14a3eb81d0e0fca2b12a13b77900b38e239bda
unbound-libs-1.7.3-17.el8_6.4.i686.rpm SHA-256: 1b6d22a225d91a015b402e2f4e9547134f650c2ec649d54e69664dc4ca834c3d
unbound-libs-1.7.3-17.el8_6.4.x86_64.rpm SHA-256: beb52ef7e1e75ec7cf334b7e01269256f7d39d0adf92463fc6a8f49246f83b32
unbound-libs-debuginfo-1.7.3-17.el8_6.4.i686.rpm SHA-256: a8ae8552c5c36395e8059417b4659cb4f190f7f9b8e581fb5bf0742fcf95a57d
unbound-libs-debuginfo-1.7.3-17.el8_6.4.x86_64.rpm SHA-256: 999b8b292cf9d65479d633ff089c6da5297e52d1be480eea5e11beea45b4ed26

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6

SRPM
unbound-1.7.3-17.el8_6.4.src.rpm SHA-256: ef8a297facf1a3a37146e85a2ab44f2e0764b34fa795a6733a046e3d5a92fb7b
aarch64
python3-unbound-1.7.3-17.el8_6.4.aarch64.rpm SHA-256: 479788bb85be9bba3936c7cbbd08214dae884cd587b7da2033a4b6e6d235a46c
python3-unbound-debuginfo-1.7.3-17.el8_6.4.aarch64.rpm SHA-256: c23ce540a2ece8e6d3caba27744f27c2ad1415fa03ef6b84776eb42f227d3e82
unbound-1.7.3-17.el8_6.4.aarch64.rpm SHA-256: 9852551560ccc9c31bb90b69a334cab10ea519e6bfafe0c6edb293c65418d56d
unbound-debuginfo-1.7.3-17.el8_6.4.aarch64.rpm SHA-256: 178b682fd8410fb864e32298977eba56e92df3df0429f875e3c6eb85c4958ac4
unbound-debugsource-1.7.3-17.el8_6.4.aarch64.rpm SHA-256: da071be4a5bac26fc6c5f32abe4d3bb7d439d79b6ff5ac51ab235b6574930983
unbound-devel-1.7.3-17.el8_6.4.aarch64.rpm SHA-256: 3c76d62ee7d3b276143e33e350f87b5b15f67a14b5d7bf83077267786cadb344
unbound-libs-1.7.3-17.el8_6.4.aarch64.rpm SHA-256: 493f9ebe989fb59597f92a410706fcfb3e583c6ff4267b895e8098ead4fc6069
unbound-libs-debuginfo-1.7.3-17.el8_6.4.aarch64.rpm SHA-256: 048689d09853d6c3ebfa06d2753062722d58363be56e8032879d67ec39a833ff

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6

SRPM
unbound-1.7.3-17.el8_6.4.src.rpm SHA-256: ef8a297facf1a3a37146e85a2ab44f2e0764b34fa795a6733a046e3d5a92fb7b
ppc64le
python3-unbound-1.7.3-17.el8_6.4.ppc64le.rpm SHA-256: 02e931b92b5f4ab7e1719e7f6d535ad171f7b968602d979ba0b03a2f296b0fb7
python3-unbound-debuginfo-1.7.3-17.el8_6.4.ppc64le.rpm SHA-256: c1fef3b29f3087275184a2cbca8fef1009e61062c45ce036c3d9f1bb0f3854a7
unbound-1.7.3-17.el8_6.4.ppc64le.rpm SHA-256: b8b239589f5c17e3bc2695623930aacae684d5b838fbcda8664a2c0661dc9894
unbound-debuginfo-1.7.3-17.el8_6.4.ppc64le.rpm SHA-256: 44f82d1877cb23e883dcca12351a70074b88e24fc21e316c84e2ed3ecbfc23da
unbound-debugsource-1.7.3-17.el8_6.4.ppc64le.rpm SHA-256: c3445c117fa12b6400389ef826a8c7cffd6ae423d787091abb59b760c0e65825
unbound-devel-1.7.3-17.el8_6.4.ppc64le.rpm SHA-256: 21d87430f3bff9a38e2218116bd46dad0b31f18c0903398b154d45e7d35f6fbe
unbound-libs-1.7.3-17.el8_6.4.ppc64le.rpm SHA-256: 6d872f5d37ec37b75591a9075cc83bad66c0ca63819547f7829556b7af64c7d8
unbound-libs-debuginfo-1.7.3-17.el8_6.4.ppc64le.rpm SHA-256: 4341c756155d7d8f8c95b786196fbbe15605d93bbd3775a67e7289aa605f91af

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6

SRPM
unbound-1.7.3-17.el8_6.4.src.rpm SHA-256: ef8a297facf1a3a37146e85a2ab44f2e0764b34fa795a6733a046e3d5a92fb7b
x86_64
python3-unbound-1.7.3-17.el8_6.4.x86_64.rpm SHA-256: f25b68c2229c957d96953678bed6723f29a17f64e66b2d2d376973e13f5e017e
python3-unbound-debuginfo-1.7.3-17.el8_6.4.i686.rpm SHA-256: cb64683ec86b748c0940a418d9105e18736cda5b275d6e557e6f7476508c1da1
python3-unbound-debuginfo-1.7.3-17.el8_6.4.x86_64.rpm SHA-256: 9b7b36bac0fa6bd2b81e5d935d18ec544d7cf9686d93946a9bada752ad0927bd
unbound-1.7.3-17.el8_6.4.x86_64.rpm SHA-256: 02ada8135e4da820eaadc3ab3f83d2d3e5c70c796424e9524b418533d6ebbb98
unbound-debuginfo-1.7.3-17.el8_6.4.i686.rpm SHA-256: 0af0360dc7570c58b306ca13e9a22bfe0b73c6f11e0c9889f1ad24b70dcd2114
unbound-debuginfo-1.7.3-17.el8_6.4.x86_64.rpm SHA-256: b8301810d878d4c71c998bca4b43f3914d6d69f3793b8291f3facea7cd8138b1
unbound-debugsource-1.7.3-17.el8_6.4.i686.rpm SHA-256: 5c7258dde7beed6a395339d9621158e95438976903394dc7c25fb4acf7d969b0
unbound-debugsource-1.7.3-17.el8_6.4.x86_64.rpm SHA-256: 63c77d3e3e1aa2da875345615333ae55b980fbf53a7843cfb31c6b1d35aadad1
unbound-devel-1.7.3-17.el8_6.4.i686.rpm SHA-256: dbce66978f3a82581ed01d13a9d88b8bfed80002d3268c1a8ec45adf4f5ee3ff
unbound-devel-1.7.3-17.el8_6.4.x86_64.rpm SHA-256: b01403e5611579c53f101db29d14a3eb81d0e0fca2b12a13b77900b38e239bda
unbound-libs-1.7.3-17.el8_6.4.i686.rpm SHA-256: 1b6d22a225d91a015b402e2f4e9547134f650c2ec649d54e69664dc4ca834c3d
unbound-libs-1.7.3-17.el8_6.4.x86_64.rpm SHA-256: beb52ef7e1e75ec7cf334b7e01269256f7d39d0adf92463fc6a8f49246f83b32
unbound-libs-debuginfo-1.7.3-17.el8_6.4.i686.rpm SHA-256: a8ae8552c5c36395e8059417b4659cb4f190f7f9b8e581fb5bf0742fcf95a57d
unbound-libs-debuginfo-1.7.3-17.el8_6.4.x86_64.rpm SHA-256: 999b8b292cf9d65479d633ff089c6da5297e52d1be480eea5e11beea45b4ed26

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility