[ALSA-2025:12064] Important: unbound security update
Type:
security
Severity:
important
Release date:
2025-07-30
Description:
The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver. Security Fix(es): * unbound: Unbound Cache poisoning (CVE-2025-5994) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 unbound-dracut-1.20.0-12.el10_0.aarch64.rpm 029b024ec0a3d7635b6fff8eedc2c12cb83a8947cc64effc49639a1b809c3b2b
aarch64 unbound-anchor-1.20.0-12.el10_0.aarch64.rpm 8d2e2e8b4493b540051b8c61e35dcd48abdf63289e6e9508fd6f7260db21d6f3
aarch64 unbound-1.20.0-12.el10_0.aarch64.rpm b7dbcf75d1d6d230db4433fb82fc11809ee46ba8b9971655031b74448fea6ad9
aarch64 unbound-devel-1.20.0-12.el10_0.aarch64.rpm bebc544c4e670598e90559128608ec110faa3ad416fa8f8a1765ce2f368d6ae8
aarch64 python3-unbound-1.20.0-12.el10_0.aarch64.rpm c274883887a317c71751e70498aa044711d35af5a7c950737ed910aac1e26466
aarch64 unbound-libs-1.20.0-12.el10_0.aarch64.rpm e03fd99847d58d3548b80532ef814f1355209d72068f1eb4ec446076dd8f9e8c
ppc64le unbound-anchor-1.20.0-12.el10_0.ppc64le.rpm 0f85902180287f3725bb5024c194cafe4917a552969056a7fd7ad161b725638c
ppc64le unbound-devel-1.20.0-12.el10_0.ppc64le.rpm 5f809aac35b719ba64169a1129e4534d75290f7d25268e688846454b8fa38c3c
ppc64le unbound-dracut-1.20.0-12.el10_0.ppc64le.rpm 5f912504868aac91157e6eb380e57a8f72a431bf89b1c6740df1887defa2414f
ppc64le unbound-1.20.0-12.el10_0.ppc64le.rpm c2d72e25ae79787d6f6f087de537f3da6b9e039b864daaf87bfee0e192b039cd
ppc64le unbound-libs-1.20.0-12.el10_0.ppc64le.rpm e9eaf902006cc8ea41ee6ef5ce378a737996d914542c41fb96d3cf36d0624c3b
ppc64le python3-unbound-1.20.0-12.el10_0.ppc64le.rpm ede8fadd425c922c4b9db294a9337a5dcc120068ebe4889f90a96541afb32f90
s390x python3-unbound-1.20.0-12.el10_0.s390x.rpm 13260b6f975b7ce65f89df6ec90840e670c742f91692e619306d0c36e132ff39
s390x unbound-anchor-1.20.0-12.el10_0.s390x.rpm 180df995d9c7f5155e2ec5178ed5bd5353f67c5ec15a146d618466e1dcf19a4c
s390x unbound-1.20.0-12.el10_0.s390x.rpm 54abcc2e823ccb36627545f0f12417f2401d9b6f99725febf345231566d6aff5
s390x unbound-dracut-1.20.0-12.el10_0.s390x.rpm 606f072d82981be2d965cd9c8a7d873a9f7507344a435d81e27fa5d2bf8c8281
s390x unbound-devel-1.20.0-12.el10_0.s390x.rpm 9d85d3e92ff4da44314dfa4fd60bac82a80a2b12647cdba0f5f6230db247de19
s390x unbound-libs-1.20.0-12.el10_0.s390x.rpm d1abe73347e58658518af97126bcd21bc15573ab9f45679641e4952cb9b81bda
x86_64 unbound-libs-1.20.0-12.el10_0.x86_64.rpm 3d02361b0e9181d5f6e6638c8861ad3df2e3332e202667472cecf609598e7bb6
x86_64 unbound-anchor-1.20.0-12.el10_0.x86_64.rpm 68fee99d36255103fb293b99bc189a355f574421b508df42665f5f48b357adb4
x86_64 python3-unbound-1.20.0-12.el10_0.x86_64.rpm 716cb02838c80c39c3ce3422c826306123a5e29e2964d8f68b957fb8176bcbb2
x86_64 unbound-devel-1.20.0-12.el10_0.x86_64.rpm 7f89de050c16b792f97243269561ab59ca287825e77cecc654af6d475e303604
x86_64 unbound-1.20.0-12.el10_0.x86_64.rpm 7fe304efd0a8dbe7b221cdda1e7789b26a9333820e85f567c63a38ebcc514cea
x86_64 unbound-dracut-1.20.0-12.el10_0.x86_64.rpm a23f773533dc63cf8eb65ae481fcbd33f29e7a17d48e3cc63d2d4507d7816f52
x86_64_v2 unbound-anchor-1.20.0-12.el10_0.x86_64_v2.rpm 1e521c132e73c832a6e28455c4142317190f1638be4ca3ccc3ac60bca9eeea51
x86_64_v2 unbound-dracut-1.20.0-12.el10_0.x86_64_v2.rpm 27322d8b464c6d48eae382095223ed5924ccf91dae63f2a9a4272076fb60e18c
x86_64_v2 unbound-devel-1.20.0-12.el10_0.x86_64_v2.rpm 28bc5bda4d1bf4aef216126ad5a8205fdb029ec5913c18431f3691d8aa6c408b
x86_64_v2 python3-unbound-1.20.0-12.el10_0.x86_64_v2.rpm 38b90126920a57d2a71227390c4e9f2561dc3aaccc97a85d732f7c53ff203893
x86_64_v2 unbound-libs-1.20.0-12.el10_0.x86_64_v2.rpm 4b598b64baf2c1d434c5e47c9ca4cbe516601f1b64dda071b26478dbfe45b288
x86_64_v2 unbound-1.20.0-12.el10_0.x86_64_v2.rpm 84163a6246c0da8dee4eff01d43a365754eecb3d0b518072222d3818433e5ae4
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.