Re: unbound update

2022-08-29 Thread Stuart Henderson
On 2022/08/26 17:47, void wrote: > On Wed, Aug 24, 2022 at 03:03:01PM +0100, Stuart Henderson wrote: > > Anyone want to test this? > > > > Any OKs? > > Hello, > > Seemed to patch OK and built OK with a -current made yesterday, on aarch64. > > I'm a newbie at building/patching openbsd, so if the

Re: unbound update

2022-08-29 Thread Theo Buehler
On Wed, Aug 24, 2022 at 03:03:01PM +0100, Stuart Henderson wrote: > Anyone want to test this? > > Any OKs? Works fine here and nothing jumps out at me in the diff. ok tb

Re: unbound update

2022-08-26 Thread void
On Wed, Aug 24, 2022 at 03:03:01PM +0100, Stuart Henderson wrote: Anyone want to test this? Any OKs? Hello, Seemed to patch OK and built OK with a -current made yesterday, on aarch64. I'm a newbie at building/patching openbsd, so if there's anything you can suggest I test, I'll test. unbound

unbound update

2022-08-24 Thread Stuart Henderson
Anyone want to test this? Any OKs? The CVEs mentioned are these: === CVE-2022-30698 Unbound prior to 1.16.2 allows malicious users to trigger continued resolvability of malicious domain names, even after their revocation from the parent zone, via a novel type of the "ghost domain names" attack t

Re: unbound update

2016-06-14 Thread Stuart Henderson
Note, there's a new directory so use patch -p0 to apply it.

unbound update

2015-07-15 Thread Stuart Henderson
Here's an update to unbound 1.5.4. There was some file reorganisation so I am providing two diffs: the one inline in this email shows the *code* changes only for those who are interested to review it; this will not build on its own. For applying and testing, use http://junkpile.org/unbound-1.5.4.d