Bug 2023549

Summary: unbound support for RFC 8767
Product: Red Hat Enterprise Linux 8 Reporter: Apurbita Mukherjee <apmukher>
Component: unboundAssignee: Petr Menšík <pemensik>
Status: CLOSED ERRATA QA Contact: Petr Sklenar <psklenar>
Severity: medium Docs Contact:
Priority: medium    
Version: 8.4CC: pemensik, pepelac, psklenar
Target Milestone: rcKeywords: Triaged
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: unbound-1.16.0-1.el8 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-11-08 09:51:08 UTC Type: Enhancement
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2087120    
Bug Blocks:    

Comment 1 Petr Menšík 2021-11-24 15:13:30 UTC
Main issue blocking upgrade is ABI and API breakage on 1.8.0 version. It changed so version of shared library provided by unbound-libs package. If we update, we would have to either make non-trivial modifications to internal library to revert ABI break or provide compatibility unbound-libs providing older library. We have to prevent breakage of other builds dependent on unbound, such as gnutls-utils and libreswan. Customers might also have their own packages built with previous library version and we should ensure we do not break their deployments.

If ABI break were not present, we would have upgraded to the latest version already. We have to decide how to avoid breakage of unbound-libs dependent builds. Additional package might be required as workaround.

Comment 5 Petr Menšík 2022-06-27 11:50:37 UTC
Serve-stale feature were added in version 1.10. Because we have rebased to 1.16.0, the new feature is already implemented. But we should add a test for basic functionality check.

Comment 14 errata-xmlrpc 2022-11-08 09:51:08 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: unbound security, bug fix, and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2022:7622